In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
"https://github.com/pypa/advisory-database/blob/main/vulns/conference-scheduler-cli/PYSEC-2018-64.yaml"