Safety vulnerability ID: 41356
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Osxcollector-output-filters before 1.1.1 uses yaml.load() instead of yaml.safe_load(), allowing a code execution vulnerability.
Latest version: 1.1.1
Filters that process and transform the output of OSXCollector
Osxcollector-Output-Filters version 1.1.1 includes a security patch for the function '_read_config' in 'osxcollector/output_filters/util/config.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/Yelp/osxcollector_output_filters/commit/f9cbe50d8f5a529d59e7cdcddc762cd0f98f5262#diff-40439d01692123eb75a4a7d5114e375d7f08d806adff4806f1f9eab3dd80b0d1
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application