Safety vulnerability ID: 41320
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Dosma 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc#
Latest version: 0.1.2
An AI-powered open-source medical image analysis toolbox
Dosma version 0.0.13 includes a security patch for the function 'init' in 'dosma/defaults.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ad12/DOSMA/commit/44457025faac9f09ac0bd26c93185adc612da7dc#
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application