WhisperX tag archive

#Web Application

This page collects WhisperX intelligence signals tagged #Web Application. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab 路 2026-04-06 07:27:07 路 GitHub Issues

1. 馃敀 CRITICAL SQL Injection in core/appHandler.js Exposes User Data

A critical SQL injection vulnerability has been identified within a core application file, exposing a direct path for attackers to execute arbitrary database commands. The flaw resides in a single line of code where user input is directly concatenated into an SQL query string without any sanitization or parameterizatio...

The Lab 路 2026-04-19 14:22:39 路 GitHub Issues

2. Task Management API Exposes XSS Risk: Unfiltered Title and Description Inputs Open to Script Injection

A critical security vulnerability exists in a task management API, where the endpoints for creating and updating tasks accept user input without any sanitization. The `POST /api/v1/tasks` and `PATCH /api/v1/tasks/:id` endpoints directly pass `title` and `description` strings to the database, creating a direct path for ...

The Lab 路 2026-04-20 19:23:01 路 GitHub Issues

3. Security Alert: Path Traversal Vulnerability Exposes Server Files in `app.py` Log Viewer

A high-severity path traversal vulnerability has been identified in a web application's log viewer, allowing attackers to read arbitrary files on the server. The flaw resides in the `show_logs` route within the `app.py` file, where user-supplied input is used directly to open files without any sanitization. By manipula...