Articles by Tag #exploit

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Exploiting Smart Contracts - Strict Equality

In this tutorial, we demonstrate how to create a strict equality attack in Solidity, including detailed setup, code examples, and execution steps, followed by essential mitigation strategies.

Learn More 44 0Jul 15 '24

Exploiting Smart Contracts - Performing Reentrancy Attacks in Solidity

In this tutorial, we demonstrate how to create a reentrancy exploit in Solidity, including detailed setup, code examples, and execution steps, followed by essential mitigation strategies

Learn More 32 2Jun 24 '24

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

This exploit disclosure was originally published by Chaitin Security Emergency Response Center. ...

Learn More 6 0Mar 25

CVE-2024-9935 - PDF Generator Addon for Elementor Page Builder <= 1.7.5 - Unauthenticated Arbitrary File Download

Overview The PDF Generator Addon for Elementor Page Builder plugin for WordPress is vulnerable to...

Learn More 5 0Dec 21 '24

Jenkins File Read Vulnerability - CVE-2024-23897

CVE-2024-23897 is a critical vulnerability in Jenkins that allows unauthenticated attackers to read...

Learn More 5 0Oct 1 '24

POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS

POC - CVE-2024–10914- Command Injection Vulnerability in name parameter for D-Link...

Learn More 5 0Nov 14 '24

Journey to understand format string attack (Part 1)

A brief background As I was a software developer, one of my focused interests in...

Learn More 0 0Oct 4 '24

Journey to understand format string attack (Part 2)

Part 1: https://dev.to/duracellrabbid/journey-to-understand-format-string-attack-part-1-5dda In Part...

Learn More 0 0Oct 4 '24