Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
pylint | 2.4.4 | <2.7.0 |
show Pylint 2.7.0 includes a fix for vulnerable regular expressions in 'pyreverse'. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
pylint | 2.4.4 | <2.13.0 |
show Pylint 2.13.0 fixes a crash when using the doc_params extension. https://github.com/PyCQA/pylint/issues/5322 |
pylint | 2.4.4 | <2.5.0 |
show Pylint 2.5.0 no longer allows ``python -m pylint ...`` to import user code. Previously, it added the current working directory as the first element of ``sys.path``. This opened up a potential security hole where ``pylint`` would import user level code as long as that code resided in modules having the same name as stdlib or pylint's own modules. |
pylint | 2.4.4 | >=0,<2.6.1 |
show Pylint before 2.6.1 is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to issues in its pyreverse component. This issue arises from certain regular expressions in pyreverse that can be exploited by causing catastrophic backtracking, significantly slowing down the service by forcing it to take a disproportionate amount of time to process inputs. This vulnerability allows attackers to use specially crafted inputs that increase the processing time exponentially, potentially leading to a service becoming inaccessible to legitimate users. https://github.com/pylint-dev/pylint/commit/5405dd5115d598fa69e49538d50ec79202b1b52e |
Package | Installed | Affected | Info |
---|---|---|---|
pyyaml | 5.3.1 | <5.4 |
show Pyyaml version 5.4 includes a fix for CVE-2020-14343: A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. https://bugzilla.redhat.com/show_bug.cgi?id=1860466 |
yamale | 2.0.1 | <3.0.8 |
show Yamale 3.0.8 includes a fix for CVE-2021-38305: 23andMe Yamale before 3.0.8 allows remote attackers to execute arbitrary code via a crafted schema file. The schema parser uses eval as part of its processing, and tries to protect from malicious expressions by limiting the builtins that are passed to the eval. When processing the schema, each line is run through Python's eval function to make the validator available. A well-constructed string within the schema rules can execute system commands; thus, by exploiting the vulnerability, an attacker can run arbitrary code on the image that invokes Yamale. https://github.com/23andMe/Yamale/pull/165 https://github.com/23andMe/Yamale/releases/tag/3.0.8 |
yamale | 2.0.1 | >0 |
show Yamale does not protect against intentionally malicious schemas. Ensure that your schema definitions come from internal or trusted sources. |
yamale | 2.0.1 | <4.0.0 |
show Yamale version 4.0.0 includes a fix for a RCE vulnerability. https://github.com/23andMe/Yamale/issues/167 |
https://pyup.io/repos/github/mlsploit/mlsploit-py/python-3-shield.svg
[](https://pyup.io/repos/github/mlsploit/mlsploit-py/)
.. image:: https://pyup.io/repos/github/mlsploit/mlsploit-py/python-3-shield.svg :target: https://pyup.io/repos/github/mlsploit/mlsploit-py/ :alt: Python 3
<a href="https://pyup.io/repos/github/mlsploit/mlsploit-py/"><img src="https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg" alt="Python 3" /></a>
!https://pyup.io/repos/github/mlsploit/mlsploit-py/python-3-shield.svg(Python 3)!:https://pyup.io/repos/github/mlsploit/mlsploit-py/
{<img src="https://pyup.io/repos/github/mlsploit/mlsploit-py/python-3-shield.svg" alt="Python 3" />}[https://pyup.io/repos/github/mlsploit/mlsploit-py/]
https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg
[](https://pyup.io/repos/github/mlsploit/mlsploit-py/)
.. image:: https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg :target: https://pyup.io/repos/github/mlsploit/mlsploit-py/ :alt: Updates
<a href="https://pyup.io/repos/github/mlsploit/mlsploit-py/"><img src="https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg" alt="Updates" /></a>
!https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg(Updates)!:https://pyup.io/repos/github/mlsploit/mlsploit-py/
{<img src="https://pyup.io/repos/github/mlsploit/mlsploit-py/shield.svg" alt="Updates" />}[https://pyup.io/repos/github/mlsploit/mlsploit-py/]