Safety vulnerability ID: 41371
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Project-Manager version 0.2.0 includes a fix for the function 'load_config' in 'project_manager/utils.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/kpj/project_manager/commit/07aef0e023f07563ae9141674e1de3508e178358#diff-03ec8dd0ad6683512ebfb1545fbf01618075f2118c80cc4878cd76ff5bf26aeb
Latest version: 0.2.0
Easily run a project with various configuration setups
Project-Manager version 0.2.0 includes a security patch for the function 'load_config' in 'project_manager/utils.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/kpj/project_manager/commit/07aef0e023f07563ae9141674e1de3508e178358#diff-03ec8dd0ad6683512ebfb1545fbf01618075f2118c80cc4878cd76ff5bf26aeb
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application