Screenshots from the blog posts
Summary
In this post, we will understand how the code injection vulnerability came to existence in a NodeJS package, named network. We will understand the vulnerable code, and make sense of the PoC exploit.
Script link
Description
Tags
Comments (0)