
Hackers Abuse Node.js to Deliver Malware – Microsoft Warns
Apr 16, 2025 · Attackers are increasingly exploiting Node.js, a widely trusted, open-source JavaScript runtime, to deliver sophisticated malware, steal sensitive data, and compromise …
Threat actors misuse Node.js to deliver malware and other …
Apr 15, 2025 · While traditional scripting languages like Python, PHP, and AutoIT remain widely used in threats, threat actors are now leveraging compiled JavaScript—or even running the …
hich enable attackers to perform remote code execution. These vulnerabilities are attributed to the occurrence of internal value TheHole leakage within the runtime's built-in function, and write …
javascript - Image script injection - Stack Overflow
Nov 3, 2015 · By using a javascript: scheme URI for the src of the image (some modern browsers mitigate this by refusing to support javascript: scheme URIs for image sources). By using bad …
Getting RCE in Chrome with incorrect side effect in the JIT compiler
Sep 26, 2023 · In this post, I’ll explain how to exploit CVE-2023-3420, a type confusion vulnerability in v8 (the Javascript engine of Chrome), that I reported in June 2023 as bug …
Attacking JS engines: Fundamentals for understanding memory …
There will be an introduction to topics like heaps, garbage collector, primitives and objects, in-memory structures, JIT interpreters and compilers, and most importantly, ways to exploit …
GHUNTER supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement …
GHunter: Universal Prototype Pollution Gadgets in JavaScript …
GHunter supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement GHunter by …
XSS attacks & exploitation: the ultimate guide – YesWeHack
Feb 11, 2025 · Cross-site scripting (XSS) injects malicious JavaScript into a victim’s browser, leading to data theft or account takeover. This guide examines how to detect and exploit …
Node.js Flaws Expose Systems To Remote Attacks
Jan 28, 2025 · A series of critical security vulnerabilities have been discovered in multiple versions of Node.js, a popular open-source JavaScript runtime used to build scalable network applications.