Safety vulnerability ID: 41404
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Yaml-Mako version 1.0.0 includes a security patch in 'yaml_mako.py'. The use of unsafe yaml.load() allows instantiation of arbitrary objects.
https://github.com/haarcuba/yaml_mako/commit/8e54bf48bf0a95495eaaf4e66cb42d8241c56f66#diff-98273dbb1f4888f07033576daad480b434f9fa909d2646e4a1e20f4691c9c757
Latest version: 1.0.0
use mako templating in your YAML files
Yaml-Mako version 1.0.0 includes a security patch for the function 'load' in 'yaml_mako.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/haarcuba/yaml_mako/commit/8e54bf48bf0a95495eaaf4e66cb42d8241c56f66#diff-98273dbb1f4888f07033576daad480b434f9fa909d2646e4a1e20f4691c9c757
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application