You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I have just discovered that my VPS exposes all my private propietary code to the Internet :) I'm not even sure if hacker can eval some really bad code like require('fs').readdirSync('/etc') when I'm debugging.
How to limit interface on which debug is listening?
Have anybody developed nodejs code snifferer or VPS backdoorer (sometimes I'm running sudo mc and can forget that)? It will not take too long to scan the Internet with zmap for first machine with port 5858 open and iterate in such way over them in a loop.
Is vulnerability discovered by Quihoo 360 researcher Guang Gong only related to Android+Chrome and not to V8 in general?
The text was updated successfully, but these errors were encountered:
I have just discovered that my VPS exposes all my private propietary code to the Internet :) I'm not even sure if hacker can eval some really bad code like
require('fs').readdirSync('/etc')
when I'm debugging.How to limit interface on which debug is listening?
Have anybody developed nodejs code snifferer or VPS backdoorer (sometimes I'm running
sudo mc
and can forget that)? It will not take too long to scan the Internet withzmap
for first machine with port5858
open and iterate in such way over them in a loop.Is vulnerability discovered by Quihoo 360 researcher Guang Gong only related to Android+Chrome and not to V8 in general?
The text was updated successfully, but these errors were encountered: