This affects all versions of package qlib. The workflow function in cli part of qlib was using an unsafe YAML load function
Reporter | Title | Published | Views | Family All 6 |
---|---|---|---|---|
![]() | PYSEC-2021-86 | 15 Feb 202116:15 | – | osv |
![]() | Code injection | 15 Feb 202116:15 | – | prion |
![]() | CVE-2021-23338 | 15 Feb 202116:15 | – | nvd |
![]() | qlib Deserialization of Untrusted Data vulnerability | 24 May 202217:42 | – | github |
![]() | Code Injection in microsoft/qlib | 21 Dec 202000:00 | – | huntr |
![]() | CVE-2021-23338 Deserialization of Untrusted Data | 15 Feb 202115:50 | – | cvelist |
[
{
"product": "qlib",
"vendor": "n/a",
"versions": [
{
"lessThan": "unspecified",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
]
Source | Link |
---|---|
github | www.github.com/418sec/huntr/pull/1329 |
snyk | www.snyk.io/vuln/SNYK-PYTHON-QLIB-1054635 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo