In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
CPE | Name | Operator | Version |
---|---|---|---|
conference-scheduler-cli | le | 0.10.1 |