Safety vulnerability ID: 41352
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Niche-Vlaanderen 1.1 includes a security patch for the function 'run_config_file' in 'niche_vlaanderen/niche.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/inbo/niche_vlaanderen/commit/cc1977d54a9267adf58bffbf0c275fb2c39bcfe8#diff-e87949fbb87229b550bad3c2ea146c46e0e1dc785be97a055eb067b3b3ec874b
Latest version: 2.1
NICHE Vlaanderen: hydro-ecological model for valley-ecosystems in Flanders
Niche-Vlaanderen version 1.1 includes a security patch for the function 'run_config_file' in 'niche_vlaanderen/niche.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/inbo/niche_vlaanderen/commit/cc1977d54a9267adf58bffbf0c275fb2c39bcfe8#diff-e87949fbb87229b550bad3c2ea146c46e0e1dc785be97a055eb067b3b3ec874b
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application