WhisperX tag archive

#code_injection

This page collects WhisperX intelligence signals tagged #code_injection. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (2)

The Lab · 2026-03-27 02:27:04 · GitHub Issues

1. serialize-javascript npm 包安全漏洞:代码注入风险未完全修复,依赖项目面临威胁

一个关键的代码注入漏洞在流行的 `serialize-javascript` npm 包中被发现,其先前针对 CVE-2020-7660 的修复被证实是不完整的。该漏洞存在于 7.0.2 及更早版本中,允许攻击者通过精心构造的正则表达式标志(`RegExp.flags`)将恶意代码注入到序列化输出中,而之前的安全补丁仅对 `RegExp.source` 进行了清理。这意味着依赖此库进行数据序列化的数千个 Node.js 和前端项目,在未升级到最新版本(7.0.3+)的情况下,其应用仍面临远程代码执行(RCE)的切实风险。 该漏洞被标记为 GitHub 安全公告 GHSA-5c6j-r48x-rmvq,是 CVE-2020-7660...

The Lab · 2026-04-19 02:22:27 · GitHub Issues

2. Engram Starter Utility Exposes Code Injection Risk via Dynamic syscall.Exec Arguments

A high-severity security flaw has been identified in the Engram project's starter utility, where the use of a dynamic argument vector (`argv`) with the `syscall.Exec` function creates a direct path for code injection. The vulnerability, flagged as 'Blocking / High' by automated scanning, resides in `cmd/starter/main.go...