<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Insecure Deserialization</title>
  <link>https://appsec.fyi/deser.html</link>
  <description>Curated Insecure Deserialization resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/deser.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Wed, 22 Apr 2026 18:38:42 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>picoCTF Super Serial Writeup: PHP Object Injection Explained Clearly</title>
    <link>https://medium.com/@laughterkings95/picoctf-super-serial-writeup-php-object-injection-explained-clearly-83201433389f</link>
    <guid isPermaLink="true">https://medium.com/@laughterkings95/picoctf-super-serial-writeup-php-object-injection-explained-clearly-83201433389f</guid>
    <description>picoCTF Super Serial Writeup: PHP Object Injection Explained Clearly</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:53:02 +0000</pubDate>
  </item>
  <item>
    <title>Deep Dive into Fastjson Deserialization Vulnerabilities</title>
    <link>https://medium.com/@pa2sw0rd/deep-dive-into-fastjson-deserialization-vulnerabilities-from-principles-to-practical-defense-c3be134ec8a6</link>
    <guid isPermaLink="true">https://medium.com/@pa2sw0rd/deep-dive-into-fastjson-deserialization-vulnerabilities-from-principles-to-practical-defense-c3be134ec8a6</guid>
    <description>Deep Dive into Fastjson Deserialization Vulnerabilities</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:53:02 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2025-24813 PoC: Apache Tomcat Java Deserialization</title>
    <link>https://github.com/yaleman/cve-2025-24813-poc</link>
    <guid isPermaLink="true">https://github.com/yaleman/cve-2025-24813-poc</guid>
    <description>CVE-2025-24813 PoC: Apache Tomcat Java Deserialization</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:53:01 +0000</pubDate>
  </item>
  <item>
    <title>WSUS Deserialization Exploit in the Wild (CVE-2025-59287)</title>
    <link>https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/</link>
    <guid isPermaLink="true">https://research.eye.security/wsus-deserialization-exploit-in-the-wild-cve-2025-59287/</guid>
    <description>WSUS Deserialization Exploit in the Wild (CVE-2025-59287)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:53:00 +0000</pubDate>
  </item>
  <item>
    <title>Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)</title>
    <link>https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-yiheng</link>
    <guid isPermaLink="true">https://www.usenix.org/conference/usenixsecurity25/presentation/zhang-yiheng</guid>
    <description>Precise and Effective Gadget Chain Mining through Deserialization-Guided Call Graph Construction (USENIX Security 2025)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:52:59 +0000</pubDate>
  </item>
  <item>
    <title>Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities</title>
    <link>https://dl.acm.org/doi/10.1145/3715711</link>
    <guid isPermaLink="true">https://dl.acm.org/doi/10.1145/3715711</guid>
    <description>Gleipner: A Benchmark for Gadget Chain Detection in Java Deserialization Vulnerabilities</description>
    <category>Insecure Deserialization</category>
    <pubDate>Wed, 22 Apr 2026 12:52:59 +0000</pubDate>
  </item>
  <item>
    <title>IBM webMethods Integration CVE-2025-36072: Deserialization RCE</title>
    <link>https://zeropath.com/blog/cve-2025-36072-ibm-webmethods-integration-deserialization-rce</link>
    <guid isPermaLink="true">https://zeropath.com/blog/cve-2025-36072-ibm-webmethods-integration-deserialization-rce</guid>
    <description>IBM webMethods Integration CVE-2025-36072: Deserialization RCE</description>
    <category>Insecure Deserialization</category>
    <pubDate>Sun, 19 Apr 2026 02:37:10 +0000</pubDate>
  </item>
  <item>
    <title>Deserialization Vulnerability — Exploit-DB Paper</title>
    <link>https://www.exploit-db.com/docs/english/44756-deserialization-vulnerability.pdf</link>
    <guid isPermaLink="true">https://www.exploit-db.com/docs/english/44756-deserialization-vulnerability.pdf</guid>
    <description>Deserialization Vulnerability — Exploit-DB Paper</description>
    <category>Insecure Deserialization</category>
    <pubDate>Sun, 19 Apr 2026 02:22:26 +0000</pubDate>
  </item>
  <item>
    <title>Cisco ISE Insecure Java Deserialization — Cisco Docs</title>
    <link>https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-ise-multivuls-FTW9AOXF.html</link>
    <guid isPermaLink="true">https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-ise-multivuls-FTW9AOXF.html</guid>
    <description>Cisco ISE Insecure Java Deserialization — Cisco Docs</description>
    <category>Insecure Deserialization</category>
    <pubDate>Sun, 19 Apr 2026 02:22:26 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Deserialization Vulnerabilities — Acunetix</title>
    <link>https://www.acunetix.com/vulnerabilities/web/tag/insecure-deserialization/</link>
    <guid isPermaLink="true">https://www.acunetix.com/vulnerabilities/web/tag/insecure-deserialization/</guid>
    <description>Insecure Deserialization Vulnerabilities — Acunetix</description>
    <category>Insecure Deserialization</category>
    <pubDate>Sun, 19 Apr 2026 02:22:25 +0000</pubDate>
  </item>
  <item>
    <title>Cisco ISE Insecure Java Deserialization (CVE-2025-20124)</title>
    <link>https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF</link>
    <guid isPermaLink="true">https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF</guid>
    <description>Cisco ISE Insecure Java Deserialization (CVE-2025-20124)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Sun, 19 Apr 2026 02:22:24 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2023-34040: Spring-Kafka Java Deserialization</title>
    <link>https://spring.io/security/cve-2023-34040/</link>
    <guid isPermaLink="true">https://spring.io/security/cve-2023-34040/</guid>
    <description>CVE-2023-34040: Spring-Kafka Java Deserialization</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:05 +0000</pubDate>
  </item>
  <item>
    <title>Apache Struts vulnerability leads to RCE</title>
    <link>https://medium.com/@virajmota38/apache-struts-vulnerability-leads-to-rce-98840f96fddb</link>
    <guid isPermaLink="true">https://medium.com/@virajmota38/apache-struts-vulnerability-leads-to-rce-98840f96fddb</guid>
    <description>Apache Struts vulnerability leads to RCE</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:05 +0000</pubDate>
  </item>
  <item>
    <title>Jackson deserialization vulnerability exploit (3 gadgets, GitHub)</title>
    <link>https://github.com/lorenzodegiorgi/jackson-vulnerability</link>
    <guid isPermaLink="true">https://github.com/lorenzodegiorgi/jackson-vulnerability</guid>
    <description>Jackson deserialization vulnerability exploit (3 gadgets, GitHub)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:04 +0000</pubDate>
  </item>
  <item>
    <title>Apache Struts2 Code Execution Exploit (Infopercept)</title>
    <link>https://www.infopercept.com/blogs/apache-struts2-code-execution-exploit</link>
    <guid isPermaLink="true">https://www.infopercept.com/blogs/apache-struts2-code-execution-exploit</guid>
    <description>Apache Struts2 Code Execution Exploit (Infopercept)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:03 +0000</pubDate>
  </item>
  <item>
    <title>Spring-web Java Deserialization: CVE-2016-1000027 (Contrast)</title>
    <link>https://support.contrastsecurity.com/hc/en-us/articles/4402400830612-Spring-web-Java-Deserialization-CVE-2016-1000027</link>
    <guid isPermaLink="true">https://support.contrastsecurity.com/hc/en-us/articles/4402400830612-Spring-web-Java-Deserialization-CVE-2016-1000027</guid>
    <description>Spring-web Java Deserialization: CVE-2016-1000027 (Contrast)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:02 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting Apache Struts: Writing Better Detections (Gigamon)</title>
    <link>https://blog.gigamon.com/2017/11/16/exploiting-apache-struts-a-case-study-in-writing-better-detections/</link>
    <guid isPermaLink="true">https://blog.gigamon.com/2017/11/16/exploiting-apache-struts-a-case-study-in-writing-better-detections/</guid>
    <description>Exploiting Apache Struts: Writing Better Detections (Gigamon)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:53:02 +0000</pubDate>
  </item>
  <item>
    <title>Friday the 13th JSON Attacks (Black Hat)</title>
    <link>https://blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf</link>
    <guid isPermaLink="true">https://blackhat.com/docs/us-17/thursday/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf</guid>
    <description>Friday the 13th JSON Attacks (Black Hat)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:30 +0000</pubDate>
  </item>
  <item>
    <title>PayloadsAllTheThings: Insecure Deserialization DotNET</title>
    <link>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/DotNET.md</link>
    <guid isPermaLink="true">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/DotNET.md</guid>
    <description>PayloadsAllTheThings: Insecure Deserialization DotNET</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:29 +0000</pubDate>
  </item>
  <item>
    <title>Basic .Net deserialization ObjectDataProvider gadget (HackTricks)</title>
    <link>https://book.hacktricks.xyz/pentesting-web/deserialization/basic-.net-deserialization-objectdataprovider-gadgets-expandedwrapper-and-json.net</link>
    <guid isPermaLink="true">https://book.hacktricks.xyz/pentesting-web/deserialization/basic-.net-deserialization-objectdataprovider-gadgets-expandedwrapper-and-json.net</guid>
    <description>Basic .Net deserialization ObjectDataProvider gadget (HackTricks)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:28 +0000</pubDate>
  </item>
  <item>
    <title>Python-Pickle-RCE-Exploit + vulnerable Flask App (GitHub)</title>
    <link>https://github.com/CalfCrusher/Python-Pickle-RCE-Exploit</link>
    <guid isPermaLink="true">https://github.com/CalfCrusher/Python-Pickle-RCE-Exploit</guid>
    <description>Python-Pickle-RCE-Exploit + vulnerable Flask App (GitHub)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:28 +0000</pubDate>
  </item>
  <item>
    <title>SOUR PICKLE: Insecure Deserialization with Python Pickle</title>
    <link>https://medium.com/@abhishek.dev.kumar.94/sour-pickle-insecure-deserialization-with-python-pickle-module-efa812c0d565</link>
    <guid isPermaLink="true">https://medium.com/@abhishek.dev.kumar.94/sour-pickle-insecure-deserialization-with-python-pickle-module-efa812c0d565</guid>
    <description>SOUR PICKLE: Insecure Deserialization with Python Pickle</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:27 +0000</pubDate>
  </item>
  <item>
    <title>PayloadsAllTheThings: Insecure Deserialization Python</title>
    <link>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/Python.md</link>
    <guid isPermaLink="true">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/Python.md</guid>
    <description>PayloadsAllTheThings: Insecure Deserialization Python</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:26 +0000</pubDate>
  </item>
  <item>
    <title>Pickle Code Execution Exploitation (Dhound)</title>
    <link>https://knowledge.dhound.io/security-practices/exploitation/pickle-code-execution</link>
    <guid isPermaLink="true">https://knowledge.dhound.io/security-practices/exploitation/pickle-code-execution</guid>
    <description>Pickle Code Execution Exploitation (Dhound)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:25 +0000</pubDate>
  </item>
  <item>
    <title>Python-socketio: Pickle deserialization RCE advisory</title>
    <link>https://github.com/miguelgrinberg/python-socketio/security/advisories/GHSA-g8c6-8fjj-2r4m</link>
    <guid isPermaLink="true">https://github.com/miguelgrinberg/python-socketio/security/advisories/GHSA-g8c6-8fjj-2r4m</guid>
    <description>Python-socketio: Pickle deserialization RCE advisory</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:24 +0000</pubDate>
  </item>
  <item>
    <title>Exploiting deserialization in recent Java versions (OWASP Stuttgart)</title>
    <link>https://owasp.org/www-chapter-stuttgart/assets/slides/2024-12-10_Exploiting_deserialization_vulnerabilities_in_recent_Java_versions.pdf</link>
    <guid isPermaLink="true">https://owasp.org/www-chapter-stuttgart/assets/slides/2024-12-10_Exploiting_deserialization_vulnerabilities_in_recent_Java_versions.pdf</guid>
    <description>Exploiting deserialization in recent Java versions (OWASP Stuttgart)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:24 +0000</pubDate>
  </item>
  <item>
    <title>Automated Discovery of Deserialization Gadget Chains (Black Hat)</title>
    <link>https://i.blackhat.com/us-18/Thu-August-9/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains-wp.pdf</link>
    <guid isPermaLink="true">https://i.blackhat.com/us-18/Thu-August-9/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chains-wp.pdf</guid>
    <description>Automated Discovery of Deserialization Gadget Chains (Black Hat)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:23 +0000</pubDate>
  </item>
  <item>
    <title>Prevent insecure deserialization attacks (Veracode)</title>
    <link>https://docs.veracode.com/r/insecure-deserialization</link>
    <guid isPermaLink="true">https://docs.veracode.com/r/insecure-deserialization</guid>
    <description>Prevent insecure deserialization attacks (Veracode)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:22 +0000</pubDate>
  </item>
  <item>
    <title>Understanding Insecure Deserialization: Risks and Mitigations</title>
    <link>https://snynr.medium.com/understanding-insecure-deserialization-risks-and-mitigations-e726dcf624e7</link>
    <guid isPermaLink="true">https://snynr.medium.com/understanding-insecure-deserialization-risks-and-mitigations-e726dcf624e7</guid>
    <description>Understanding Insecure Deserialization: Risks and Mitigations</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:21 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Hunting: Insecure Deserialization</title>
    <link>https://medium.com/@NiaziSec/bug-bounty-hunting-web-vulnerability-insecure-deserialization-6df3491dc33c</link>
    <guid isPermaLink="true">https://medium.com/@NiaziSec/bug-bounty-hunting-web-vulnerability-insecure-deserialization-6df3491dc33c</guid>
    <description>Bug Bounty Hunting: Insecure Deserialization</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:20 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Deserialization - Attack Technique (vuln.today)</title>
    <link>https://vuln.today/techniques/deserialization</link>
    <guid isPermaLink="true">https://vuln.today/techniques/deserialization</guid>
    <description>Insecure Deserialization - Attack Technique (vuln.today)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 17 Apr 2026 14:52:20 +0000</pubDate>
  </item>
  <item>
    <title>Depickling, Gadgets, and Chains: The Exploit That Unraveled Equifax</title>
    <link>https://brandur.org/fragments/gadgets-and-chains</link>
    <guid isPermaLink="true">https://brandur.org/fragments/gadgets-and-chains</guid>
    <description>Depickling, Gadgets, and Chains: The Exploit That Unraveled Equifax</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:34 +0000</pubDate>
  </item>
  <item>
    <title>How to Exploit PHAR Deserialization Vulnerability</title>
    <link>https://pentest-tools.com/blog/exploit-phar-deserialization-vulnerability</link>
    <guid isPermaLink="true">https://pentest-tools.com/blog/exploit-phar-deserialization-vulnerability</guid>
    <description>How to Exploit PHAR Deserialization Vulnerability</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:33 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Reflection Practices in Java and C#</title>
    <link>https://www.sprocketsecurity.com/blog/a-primer-on-insecure-reflection-practices-in-java-and-c-applications</link>
    <guid isPermaLink="true">https://www.sprocketsecurity.com/blog/a-primer-on-insecure-reflection-practices-in-java-and-c-applications</guid>
    <description>Insecure Reflection Practices in Java and C#</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:32 +0000</pubDate>
  </item>
  <item>
    <title>Java Deserialization Tricks - Synacktiv</title>
    <link>https://www.synacktiv.com/en/publications/java-deserialization-tricks</link>
    <guid isPermaLink="true">https://www.synacktiv.com/en/publications/java-deserialization-tricks</guid>
    <description>Java Deserialization Tricks - Synacktiv</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:31 +0000</pubDate>
  </item>
  <item>
    <title>Deep Dive into .NET ViewState Deserialization</title>
    <link>https://swapneildash.medium.com/deep-dive-into-net-viewstate-deserialization-and-its-exploitation-54bf5b788817</link>
    <guid isPermaLink="true">https://swapneildash.medium.com/deep-dive-into-net-viewstate-deserialization-and-its-exploitation-54bf5b788817</guid>
    <description>Deep Dive into .NET ViewState Deserialization</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:30 +0000</pubDate>
  </item>
  <item>
    <title>ViewState Deserialization Zero-Day in Sitecore (CVE-2025-53690)</title>
    <link>https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability</link>
    <guid isPermaLink="true">https://cloud.google.com/blog/topics/threat-intelligence/viewstate-deserialization-zero-day-vulnerability</guid>
    <description>ViewState Deserialization Zero-Day in Sitecore (CVE-2025-53690)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:30 +0000</pubDate>
  </item>
  <item>
    <title>The Art of Hide and Seek: Pickle-Based Model Supply Chain Poisoning</title>
    <link>https://arxiv.org/html/2508.19774v1</link>
    <guid isPermaLink="true">https://arxiv.org/html/2508.19774v1</guid>
    <description>The Art of Hide and Seek: Pickle-Based Model Supply Chain Poisoning</description>
    <category>Insecure Deserialization</category>
    <pubDate>Thu, 16 Apr 2026 21:03:29 +0000</pubDate>
  </item>
  <item>
    <title>Insecure Deserialization: Risks, Examples, and Best Practices</title>
    <link>https://promon.io/mobile-attack-vector-library/insecure-deserialization</link>
    <guid isPermaLink="true">https://promon.io/mobile-attack-vector-library/insecure-deserialization</guid>
    <description>Insecure Deserialization: Risks, Examples, and Best Practices</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:12 +0000</pubDate>
  </item>
  <item>
    <title>Deserialization Gadget Chain Definition</title>
    <link>https://pentesterlab.com/glossary/deserialization-gadget-chain</link>
    <guid isPermaLink="true">https://pentesterlab.com/glossary/deserialization-gadget-chain</guid>
    <description>Deserialization Gadget Chain Definition</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:11 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-20963: SharePoint Deserialization RCE Analysis</title>
    <link>https://securityboulevard.com/2026/03/cve-2026-20963-sharepoint-deserialization-remote-code-execution-vulnerability/</link>
    <guid isPermaLink="true">https://securityboulevard.com/2026/03/cve-2026-20963-sharepoint-deserialization-remote-code-execution-vulnerability/</guid>
    <description>CVE-2026-20963: SharePoint Deserialization RCE Analysis</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:10 +0000</pubDate>
  </item>
  <item>
    <title>SharePoint Zero-Day CVE-2025-53770 Actively Exploited</title>
    <link>https://blog.checkpoint.com/research/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/</link>
    <guid isPermaLink="true">https://blog.checkpoint.com/research/sharepoint-zero-day-cve-2025-53770-actively-exploited-what-security-teams-need-to-know/</guid>
    <description>SharePoint Zero-Day CVE-2025-53770 Actively Exploited</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:09 +0000</pubDate>
  </item>
  <item>
    <title>SolarWinds Web Help Desk Deserialization Vulnerability</title>
    <link>https://cybersecuritynews.com/solarwinds-web-help-desk-deserialization-vulnerability/</link>
    <guid isPermaLink="true">https://cybersecuritynews.com/solarwinds-web-help-desk-deserialization-vulnerability/</guid>
    <description>SolarWinds Web Help Desk Deserialization Vulnerability</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:08 +0000</pubDate>
  </item>
  <item>
    <title>SnakeYAML Deserialization Deep Dive (CVE-2022-1471)</title>
    <link>https://www.greynoise.io/blog/cve-2022-1471-snakeyaml-deserialization-deep-dive</link>
    <guid isPermaLink="true">https://www.greynoise.io/blog/cve-2022-1471-snakeyaml-deserialization-deep-dive</guid>
    <description>SnakeYAML Deserialization Deep Dive (CVE-2022-1471)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:07 +0000</pubDate>
  </item>
  <item>
    <title>Docling RCE via PyYAML (CVE-2026-24009)</title>
    <link>https://www.oligo.security/blog/docling-rce-a-shadow-vulnerability-introduced-via-pyyaml-cve-2026-24009</link>
    <guid isPermaLink="true">https://www.oligo.security/blog/docling-rce-a-shadow-vulnerability-introduced-via-pyyaml-cve-2026-24009</guid>
    <description>Docling RCE via PyYAML (CVE-2026-24009)</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:06 +0000</pubDate>
  </item>
  <item>
    <title>PyTorch Users at Risk: 3 Zero-Day PickleScan Vulnerabilities</title>
    <link>https://jfrog.com/blog/unveiling-3-zero-day-vulnerabilities-in-picklescan/</link>
    <guid isPermaLink="true">https://jfrog.com/blog/unveiling-3-zero-day-vulnerabilities-in-picklescan/</guid>
    <description>PyTorch Users at Risk: 3 Zero-Day PickleScan Vulnerabilities</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:05 +0000</pubDate>
  </item>
  <item>
    <title>PickleBall: Secure Deserialization of Pickle-based ML Models</title>
    <link>https://arxiv.org/abs/2508.15987</link>
    <guid isPermaLink="true">https://arxiv.org/abs/2508.15987</guid>
    <description>PickleBall: Secure Deserialization of Pickle-based ML Models</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:04 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33728: dd-trace-java Unsafe Deserialization in RMI</title>
    <link>https://advisories.gitlab.com/pkg/maven/com.datadoghq/dd-java-agent/CVE-2026-33728/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/pkg/maven/com.datadoghq/dd-java-agent/CVE-2026-33728/</guid>
    <description>CVE-2026-33728: dd-trace-java Unsafe Deserialization in RMI</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:03 +0000</pubDate>
  </item>
  <item>
    <title>CVE-2026-33439: OpenAM Pre-Auth RCE via Deserialization</title>
    <link>https://advisories.gitlab.com/pkg/maven/org.openidentityplatform.openam/openam/CVE-2026-33439/</link>
    <guid isPermaLink="true">https://advisories.gitlab.com/pkg/maven/org.openidentityplatform.openam/openam/CVE-2026-33439/</guid>
    <description>CVE-2026-33439: OpenAM Pre-Auth RCE via Deserialization</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:02 +0000</pubDate>
  </item>
  <item>
    <title>PayloadsAllTheThings - Ruby Deserialization Payloads</title>
    <link>https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/Ruby.md</link>
    <guid isPermaLink="true">https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Insecure%20Deserialization/Ruby.md</guid>
    <description>PayloadsAllTheThings - Ruby Deserialization Payloads</description>
    <category>Insecure Deserialization</category>
    <pubDate>Fri, 10 Apr 2026 01:35:01 +0000</pubDate>
  </item>
</channel>
</rss>