Safety vulnerability ID: 41330
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Imgstore 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a
Latest version: 0.3.7
IMGStore houses your video frames
Imgstore version 0.2.9 includes a security patch for the function 'new_for_filename' in 'imgstore/stores.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/loopbio/imgstore/commit/06b49a519b687ff3cd20b06c4c797818df812d06#diff-9e38eed8462f9c72f080c6c96c054a06d828dbd0ebca39f3738471d4557c704a
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application