In conference-scheduler-cli, a pickle.load call on imported data allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call.
{
"nvd_published_at": null,
"severity": "HIGH",
"github_reviewed_at": "2020-06-16T21:31:12Z",
"github_reviewed": true,
"cwe_ids": [
"CWE-502",
"CWE-78"
]
}