Show filters
2 Total Results
Displaying 1-2 of 2
Sort by:
Attacker Value


Disclosure Date: February 19, 2020 (last updated June 05, 2020)
PyYAML 5.1 through 5.1.2 has insufficient restrictions on the load and load_all functions because of a class deserialization issue, e.g., Popen is a class in the subprocess module. NOTE: this issue exists because of an incomplete fix for CVE-2017-18342.
Attacker Value


Disclosure Date: June 27, 2018 (last updated October 15, 2020)
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.