In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| conference-scheduler-cli(PyPI) | 0 | N/A | N/A |
CVSS Metrics