🌐
Exploit-DB
exploit-db.com › exploits › 45048
JavaScript Core - Arbitrary Code Execution - Multiple local Exploit
July 11, 2018 - a[randomString()] = 1337; structs.push(a); } } // Here we will create our fake typed array and get arbitrary read/write // See http://www.phrack.org/papers/attacking_javascript_engines.html function getArb(prims) { sprayStructures() let utarget = new Uint8Array(0x10000); utarget[0] = 0x41; // Our fake array // Structure id guess is 0x200 // [ Indexing type = 0 ][ m_type = 0x27 (float array) ][ m_flags = 0x18 (OverridesGetOwnPropertySlot) ][ m_cellState = 1 (NewWhite)] let jscell = new Int64('0x0118270000000200'); // Construct the object // Each attribute will set 8 bytes of the fake object inl
🌐
Codacy
blog.codacy.com › javascript-vulnerabilities
Common JavaScript Vulnerabilities and How to Avoid Them
3 weeks ago - If an attacker can control the input passed to eval(), they can execute arbitrary JavaScript code. This can lead to full compromise of the application, including access to sensitive data, alteration of application behavior, and further exploitation.
🌐
ResearchGate
researchgate.net › figure › Typical-JavaScript-exploit-found-in-the-wild-that-demonstrates-environment-matching_fig2_221668983
Typical JavaScript exploit found in the wild that demonstrates... | Download Scientific Diagram
JavaScript's widespread adoption has made it an attractive target for malicious attackers who employ sophisticated obfuscation techniques to conceal harmful code. Current deobfuscation tools suffer from critical limitations that severely restrict their practical effectiveness.
🌐
F-Secure
f-secure.com › v-descs › exploit-js-magnitudeek-g.shtml
Exploit:JS/MagnitudeEK.G | F-Secure
Exploit:JS/MagnitudeEK.G identifies JavaScript code that redirects users to malicious webpages hosting the Magnitude exploit kit.
🌐
GitHub
github.com › topics › exploit
exploit · GitHub Topics · GitHub
firefox exploit exploitation remote-code-execution cve-2019-9810 ... A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques · firefox apt exploit chain jit rpc pac wpad star shellcode double eop alpc cve-2020-0674 cve-2019-17026 darkhotel ... javascript ...
🌐
Gitbooks
ckarande.gitbooks.io › owasp-nodegoat-tutorial › content › tutorial › a1_-_server_side_js_injection.html
Server Side JS Injection | OWASP NodeGoat Tutorial
When eval(), setTimeout(), setInterval(), Function()are used to process user provided inputs, it can be exploited by an attacker to inject and execute malicious JavaScript code on server.
🌐
GitHub
github.com › theori-io › pwnjs
GitHub - theori-io/pwnjs: A Javascript library for browser exploitation
A Javascript library for browser exploitation. Contribute to theori-io/pwnjs development by creating an account on GitHub.
Starred by 891 users
Forked by 108 users
Languages   JavaScript 100.0% | JavaScript 100.0%
🌐
Medium
medium.com › @mudassir.shabbir › understanding-javascript-vulnerabilities-with-examples-6eb9be9065e6
Understanding JavaScript Vulnerabilities with Examples | by mudassir shabbir | Medium
July 25, 2024 - Server-side JavaScript injection is a type of attack where an attacker can execute arbitrary JavaScript code on the server. This can occur when user inputs are improperly handled and directly executed, often via functions like eval, setTimeout, ...
🌐
PortSwigger
portswigger.net › daily-swig › remote-code-execution-vulnerability-exposed-in-popular-javascript-serialization-package
Remote code execution vulnerability exposed in popular JavaScript serialization package | The Daily Swig
June 18, 2021 - The advisory adds that the UID has a keyspace of approximately four billion, making exploitation a “realistic network attack”. The proof of concept below, for example, is able to call console.log() “when the `serialize()`d version is `eval()`d”. eval('('+ serialize({"foo": /1" + console.log(1)/i, "bar": '"@__R-<UID>-0__@'}) + ')'); The vulnerability is patched in serialize-javascript version 3.1.0 and has been resolved by contributors through changes to code ensuring placeholders are not preceded by a backslash.
Find elsewhere
🌐
OWASP Foundation
owasp.org › www-project-web-security-testing-guide › v41 › 4-Web_Application_Security_Testing › 11-Client_Side_Testing › 02-Testing_for_JavaScript_Execution
Testing for JavaScript Execution
This implies that an attacker could inject JavaScript code simply by submitting the following query string: www.victim.com/?javascript:alert(1).
🌐
Snyk
snyk.io › articles › javascript-security
JavaScript Security | JavaScript Vulnerabilities | Snyk
June 3, 2020 - Most common JavaScript attack vectors ... tricking users into performing unintended actions, and exploiting vulnerabilities in the source code of web applications....
🌐
OX Security
ox.security › blog › top-javascript-vulnerabilities
5 Common JavaScript Vulnerabilities & How to Avoid Them - OX Security
June 24, 2025 - Code injection attacks using JavaScript can exploit cross-site scripting flaws. The application sends unverifiable data to browsers, and hackers seek the opportunity to insert malicious scripts on trustworthy web pages and exploit websites to ...
🌐
F-Secure
f-secure.com › v-descs › exploit-js-agent-ihl.shtml
Exploit:JS/Agent.IHL | F-Secure
Exploit:JS/Agent.IHL is JavaScript code that exploits a vulnerability found in versions of Microsoft Internet Explorer.
🌐
Ret2
browser.training.ret2.systems › content › module_1 › 3_javascript › javascript
JavaScript Fundamentals
JavaScript> 0x4142434445464748.toString(16) 4142434445464800 · When writing an exploit, we will often abuse doubles to pull off a type confusion.
🌐
GitHub
gist.github.com › itszn › 5e6354ff7975e65e5867f3a660e23e05
Exploit for JavascriptCore CVE-2018-4192 · GitHub
Exploit for JavascriptCore CVE-2018-4192. GitHub Gist: instantly share code, notes, and snippets.
🌐
OWASP Foundation
owasp.org › www-community › attacks › xss
Cross Site Scripting (XSS) | OWASP Foundation
Attackers would include JavaScript in their guestbook entries, and all subsequent visitors to the guestbook page would execute the malicious code. As the examples demonstrate, XSS vulnerabilities are caused by code that includes unvalidated data in an HTTP response. There are three vectors by which an XSS attack can reach a victim: As in Example 1, data is read directly from the HTTP request and reflected back in the HTTP response. Reflected XSS exploits ...
🌐
Security Boulevard
securityboulevard.com › home › cybersecurity › application security › the top ten javascript vulnerabilities and how to avoid them
The Top Ten JavaScript Vulnerabilities and How to Avoid Them - Security Boulevard
April 19, 2023 - Attackers can exploit these vulnerabilities by identifying and targeting specific outdated components or libraries within a JavaScript application. They may also use automated tools to scan for known vulnerabilities in popular libraries and ...
🌐
StationX
stationx.net › home › javascript for hacking made easy: expert guide
JavaScript for Hacking Made Easy: Expert Guide
November 17, 2025 - First, this HTML file assigns the form to follow with an ID as ‘exploit-form’ and then defines the JavaScript function submit() to submit the form as POST when called. All of this is done in the head of the file. The form itself replicates the code that we took from the developer console earlier when we identified the form field we want to exploit (this is the forged request on behalf of the authenticated user).
🌐
PortSwigger
portswigger.net › web-security › cross-site-scripting › exploiting
Exploiting cross-site scripting vulnerabilities | Web Security Academy
You can exploit cross-site scripting vulnerabilities to send the victim's cookies to your own domain, then manually inject the cookies into the browser and impersonate the victim. In practice, this approach has some significant limitations: The victim might not be logged in. Many applications hide their cookies from JavaScript using the HttpOnly flag.