In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{ "nvd_published_at": null, "cwe_ids": [ "CWE-502", "CWE-78" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:31:12Z" }