Safety vulnerability ID: 76306
The information on this page was manually curated by our Cybersecurity Intelligence Team.
A maliciously crafted QPY file containing can potentially execute arbitrary-code embedded in the payload without privilege escalation when deserializing QPY formats < 13. A python process calling Qiskit's qiskit.qpy.load() function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of a specially constructed payload.
Latest version: 2.0.0
An open-source SDK for working with quantum computers at the level of extended quantum circuits, operators, and primitives.
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application