Safety vulnerability ID: 41392
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects. Consider yaml.safe_load().
https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98
Latest version: 0.0.4
selenium like ansible
Selenible version 0.0.4 includes a security patch for the function 'Base_var_from' in 'selenible/modules/ctrl.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/wtnb75/selenible/commit/4e53114278475d94dd0c98fd6dbf41806b2c1c98
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application