Safety vulnerability ID: 41335
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Locopy 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/capitalone/locopy/pull/105
Latest version: 0.6.4
Loading/Unloading to Amazon Redshift using Python
Locopy version 0.3.8 includes a security patch for the function 'read_config_yaml' in 'locopy/utility.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/capitalone/locopy/pull/105
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application