WhisperX tag archive

#CWE-502

This page collects WhisperX intelligence signals tagged #CWE-502. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (7)

The Lab · 2026-04-08 17:27:09 · GitHub Issues

1. Critical Code Flaw: Unsafe Pickle/YAML Deserialization in `app.py` Exposes System to Arbitrary Code Execution

A critical security vulnerability has been identified in a Python application's `app.py` file, exposing the system to remote code execution. The flaw, classified under CWE-502, resides at line 126 where the code uses `pickle.loads()` to deserialize user-supplied data from a web request without any validation. This inse...

The Lab · 2026-04-08 17:27:10 · GitHub Issues

2. Critical Code Flaw: Unsafe YAML Deserialization in `app.py` Exposes System to Arbitrary Code Execution

A critical security vulnerability has been identified in a codebase, exposing a direct path for attackers to execute arbitrary code on affected systems. The flaw resides in the `app.py` file at line 113, where the `yaml.load()` function is used with the unsafe default `Loader=yaml.Loader`. This pattern, classified as C...

The Lab · 2026-04-13 07:22:34 · GitHub Issues

3. Critical Code Flaw: Arbitrary Code Execution via pickle.loads() in arubis/pygoat-vulnerability-demo

A critical security vulnerability has been identified in the `arubis/pygoat-vulnerability-demo` repository, exposing the application to arbitrary code execution. The flaw is a textbook case of insecure deserialization, classified as CWE-502 and falling under the OWASP Top 10 category for Software and Data Integrity Fai...

The Lab · 2026-04-21 18:22:57 · GitHub Issues

4. Critical Code Flaw: Insecure Pickle Deserialization in `app.py` Exposes System to Arbitrary Code Execution

A critical security vulnerability has been identified in the `app.py` file, exposing a web application to potential remote code execution. The flaw resides in the `import_data` endpoint, which directly deserializes user-supplied, base64-encoded data using Python's inherently unsafe `pickle` module. This design allows a...

The Lab · 2026-04-21 18:22:59 · GitHub Issues

5. Critical RCE Vulnerability in `app.py`: Insecure YAML Deserialization Exposes System to Remote Code Execution

A critical security vulnerability has been identified in a codebase's `app.py` file, exposing a direct path for attackers to execute arbitrary code on the host system. The flaw resides at line 137 within the `update_config` endpoint, which uses the unsafe `yaml.Loader` for deserialization. This method is a known securi...

The Lab · 2026-04-29 03:54:09 · GitHub Issues

6. Incomplete Deserialization Fix Leaves Apache MINA Vulnerable to Code Execution via Static Initializer Timing Gap

A critical vulnerability in Apache MINA has been identified where a previous security fix was applied incompletely, leaving a window for potential remote code execution. The issue centers on CVE-2024-52046's remediation in the AbstractIoBuffer.getObject() method, where the classname allowlist designed to restrict deser...

The Lab · 2026-05-07 03:31:42 · GitHub Issues

7. Critical Deserialization Flaw in Apache MINA Bypasses Security Filter, Affects Multiple Versions

A critical deserialization vulnerability has been identified in Apache MINA's core library, potentially allowing attackers to execute arbitrary code on affected systems. The flaw, tracked as CVE-2026-41635, exists in the AbstractIoBuffer.resolveClass() method, where one execution path fails to validate classes against ...