The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party.
{
"cpe": "cpe:2.3:a:exotel_project:exotel:0.1.6:*:*:*:*:python:*:*",
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "0.1.6"
}
]
}