Safety vulnerability ID: 41310
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Chartify version 3.0.3 includes a security patch for the function '_from_yaml' in 'chartify/_core/colors.py'. It used the unsafe yaml.load(), that allows instantiation of arbitrary objects.
https://github.com/spotify/chartify/commit/e9d34194b19f973b934497a1013c918bc8a98fee#diff-8238e9741da72d8460f3b7e87879bad2821fe5cfbadb42112a6a7373ee5c494a
Latest version: 5.0.1
Python library to make plotting simpler for data scientists
Chartify version 3.0.3 includes a security patch for the function '_from_yaml' in 'chartify/_core/colors.py'. Use of unsafe yaml load. Allows instantiation of arbitrary objects. Consider yaml.safe_load(). See also: https://github.com/spotify/chartify/commit/e9d34194b19f973b934497a1013c918bc8a98fee#diff-8238e9741da72d8460f3b7e87879bad2821fe5cfbadb42112a6a7373ee5c494a
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application