mirror of https://github.com/MISP/PyMISP
![]() The MISP Event loader was trying to open any string passed as parameter if is an existing filepath. Anything that isn't a valid MISP event would raise an exception, but I can see it used for malicous purposes. load_file is will do the same, but the user can decide if it is safe to use. |
||
---|---|---|
.. | ||
data | ||
tools | ||
__init__.py | ||
api.py | ||
exceptions.py | ||
mispevent.py |