The Latest Exploits/Vulnerabilities





Exploit Discussion

Find the Best Exploits/Vulnerabilities from 2020 here:


Fuzzilli - JavaScript Engine Fuzzing Library

Fuzzilli – JavaScript Engine Fuzzing Library

Fuzzilii is a JavaScript engine fuzzing library, it’s a coverage-guided fuzzer for dynamic language interpreters based on a custom intermediate language (“FuzzIL”) which can be mutated and translated to JavaScript. When fuzzing for core interpreter bugs, e.g. in JIT compilers, semantic correctness of generated programs becomes a concern. This is in contrast to most other […]

Topic: Exploits/Vulnerabilities
Four Year Old libSSH Bug Leaves Servers Wide Open

Four Year Old libssh Bug Leaves Servers Wide Open

A fairly serious 4-year old libssh bug has left servers vulnerable to remote compromise, fortunately, the attack surface isn’t that big as neither OpenSSH or the GitHub implementation are affected. The bug is in the not so widely used libSSH library, not to be confused with libssh2 or OpenSSH – which are very widely used. […]

Topic: Exploits/Vulnerabilities
SCADA Hacking - Industrial Systems Woefully Insecure

SCADA Hacking – Industrial Systems Woefully Insecure

It seems like SCADA hacking is still a topic in hacker conferences, and it should be with SCADA systems still driving power stations, manufacturing plants, refineries and all kinds of other powerful and dangerous things. The latest talk given on the subject shows with just 4 lines of code and a small hardware drop device […]

Topic: Exploits/Vulnerabilities
XXE Injection Attacks - XML External Entity Vulnerability With Examples

XXE Injection Attacks – XML External Entity Vulnerability With Examples

XXE Injection Attacks or XML External Entity vulnerabilities are a specific type of Server Side Request Forgery or SSRF attack relating to abusing features within XML parsers. The features these attacks go after are widely available but rarely used and when trigged can cause a DoS (Denial of Service) attack and in some cases much […]

Topic: Exploits/Vulnerabilities
UACMe - Defeat Windows User Account Control (UAC)

UACMe – Defeat Windows User Account Control (UAC)

UACme is a compiled, C-based tool which contains a number of methods to defeat Windows User Account Control commonly known as UAC. It abuses the built-in Windows AutoElevate backdoor and contains 41 methods. The tool requires an Admin account with the Windows UAC set to default settings. Usage Run executable from command line: akagi32 [Key] […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking