Safety vulnerability ID: 41326
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Glooey 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947
Latest version: 0.3.6
An object-oriented GUI library for pyglet.
Glooey version 0.3.5 includes a security patch for the function 'yaml' in 'glooey/themes/helpers.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/kxgames/glooey/commit/9178939df55a44dcf0a890aec0aceef2f4989947
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application