Safety vulnerability ID: 76305
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A maliciously crafted QPY file containing can potentially execute arbitrary-code embedded in the payload without privilege escalation when deserializing QPY formats < 13. A python process calling Qiskit's qiskit.qpy.load() function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of a specially constructed payload.
Latest version: 0.46.3
Software for developing quantum computing programs
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application