Safety vulnerability ID: 36425
The information on this page was manually curated by our Cybersecurity Intelligence Team.
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
Latest version: 0.10.1
A command line tool to manage the schedule for a conference
In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
MISC:https://github.com/PyconUK/ConferenceScheduler-cli/issues/19: https://github.com/PyconUK/ConferenceScheduler-cli/issues/19
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application