Node.js is vulnerable to hash flooding. Install security updates now! https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/ …
Here’s how hash flooding attacks work:
-
-
Hash flooding attacks trigger the worst-case scenario by sending precomputed data, where all keys hash to the same value.
-
If this data somehow gets inserted in a hash table on the server-side, the attack takes effect.
- 7 more replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.
JavaScript, HTML, CSS, HTTP, performance, security, Bash, Unicode, i18n, macOS.