Safety vulnerability ID: 41322
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Edapy 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f
Latest version: 0.4.1
A tookit for exploratoriy data analysis.
Edapy version 0.3.0 includes a security patch for the function '_read_yaml' in 'edapy/csv/init.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/MartinThoma/edapy/commit/47b958781a702e176ea72fe59ab8596ad93aabdc#diff-150063df356bdd6b5d718194a9ccb7750d86f8608959d31cef59012a8471709f
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application