Safety vulnerability ID: 41324
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Entente 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. it used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e
Latest version: 2.2.2
Polygonal meshes in vertex-wise correspondence
Entente version 0.11.0 includes a security patch for the function 'test_composite_landmarks_cli' in 'entente/test_cli.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/lace/entente/commit/bbbf1985cbb38f749e7dd998bbf42b72c4d1d99c#diff-52de9aa5fb74fe3cdb1d128e9e6b246c69003cf86a181c79f22ec2510dc19b3e
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application