About 134,000 results
Open links in new tab
  1. Hackers Abuse Node.js to Deliver Malware – Microsoft Warns

    Apr 16, 2025 · Attackers are increasingly exploiting Node.js, a widely trusted, open-source JavaScript runtime, to deliver sophisticated malware, steal sensitive data, and compromise …

  2. Threat actors misuse Node.js to deliver malware and other …

    Apr 15, 2025 · While traditional scripting languages like Python, PHP, and AutoIT remain widely used in threats, threat actors are now leveraging compiled JavaScript—or even running the …

  3. hich enable attackers to perform remote code execution. These vulnerabilities are attributed to the occurrence of internal value TheHole leakage within the runtime's built-in function, and write …

  4. javascript - Image script injection - Stack Overflow

    Nov 3, 2015 · By using a javascript: scheme URI for the src of the image (some modern browsers mitigate this by refusing to support javascript: scheme URIs for image sources). By using bad …

  5. Getting RCE in Chrome with incorrect side effect in the JIT compiler

    Sep 26, 2023 · In this post, I’ll explain how to exploit CVE-2023-3420, a type confusion vulnerability in v8 (the Javascript engine of Chrome), that I reported in June 2023 as bug …

  6. Attacking JS engines: Fundamentals for understanding memory …

    There will be an introduction to topics like heaps, garbage collector, primitives and objects, in-memory structures, JIT interpreters and compilers, and most importantly, ways to exploit …

  7. GHUNTER supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement …

  8. GHunter: Universal Prototype Pollution Gadgets in JavaScript

    GHunter supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement GHunter by …

  9. XSS attacks & exploitation: the ultimate guide – YesWeHack

    Feb 11, 2025 · Cross-site scripting (XSS) injects malicious JavaScript into a victim’s browser, leading to data theft or account takeover. This guide examines how to detect and exploit …

  10. Node.js Flaws Expose Systems To Remote Attacks

    Jan 28, 2025 · A series of critical security vulnerabilities have been discovered in multiple versions of Node.js, a popular open-source JavaScript runtime used to build scalable network applications.

Refresh