Safety vulnerability ID: 70598
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
Latest version: 0.15.37
ruamel.yaml is a YAML parser/emitter that supports roundtrip preservation of comments, seq/map flow style, and map key order
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application