Safety vulnerability ID: 41372
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Pycontw-Report-Generator version 1.5.0 includes a fix for the function 'read_yaml' in 'report_generator/io/yaml.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/pycontw/pycontw-postevent-report-generator/commit/f872f9f207e7a6f14e04ff77ca49922c6a0839b4
Latest version: 1.5.2
PyCon TW post-event report generator. A cli command to generate PyCon TW post-event reports.
Pycontw-Report-Generator version 1.5.0 includes a security patch for the function 'read_yaml' in 'report_generator/io/yaml.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/pycontw/pycontw-postevent-report-generator/commit/f872f9f207e7a6f14e04ff77ca49922c6a0839b4
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application