Safety vulnerability ID: 41321
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Drt 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed
Latest version: 1.2.1
dvd copying and ripping management tool
Drt version 1.2.1 includes a security patch for the function 'readConfig' in 'drt/configfile.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/ccdale/drt/commit/2fffc617a9ddac040182d54a3227c87eb268b8ed
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application