All vulnerabilities
CVE-2017-18342
PyYAML insecurely deserializes YAML strings leading to arbitrary code execution
Description
In PyYAML before 5.1, the yaml.load() API could execute arbitrary code if used with untrusted data. The load() function has been deprecated in version 5.1 and the 'UnsafeLoader' has been introduced for backward compatibility with the function.
Patch Available
Fix available through Seal Security.
No upgrade required, protect your application instantly.
Fix without upgrading
Score
Severity
Ecosystem
RPM
Publish Date
June 27, 2018
Modified Date
November 7, 2023
Score Vector
Affected Versions

