Safety vulnerability ID: 76321
The information on this page was manually curated by our Cybersecurity Intelligence Team.
An unsafe deserialization vulnerability in Python’s pickle module allows an attacker to bypass static analysis tools like Picklescan and execute arbitrary code during deserialization. This can be exploited to run pip install and fetch a malicious package, enabling remote code execution (RCE) upon package installation.
Latest version: 0.0.24
Security scanner detecting Python Pickle files performing suspicious actions
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application