blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587

Preview meta tags from the blog.pixee.ai website.

Linked Hostnames

9

Thumbnail

Search Engine Appearance

Google

https://blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587

Breaking down the Node.js sandbox bypass CVE-2023-30587

Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...



Bing

Breaking down the Node.js sandbox bypass CVE-2023-30587

https://blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587

Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...



DuckDuckGo

https://blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587

Breaking down the Node.js sandbox bypass CVE-2023-30587

Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...

  • General Meta Tags

    13
    • title
      Breaking down the Node.js sandbox bypass CVE-2023-30587
    • charset
      UTF-8
    • viewport
      width=device-width, initial-scale=1, shrink-to-fit=no
    • description
      Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...
    • author
      Arshan Dabirsiaghi
  • Open Graph Meta Tags

    6
    • image
      https://hashnode.com/utility/r?url=https%3A%2F%2Fcdn.hashnode.com%2Fres%2Fhashnode%2Fimage%2Fstock%2Funsplash%2Fw7ZyuGYNpRQ%2Fupload%2F6529148da7c2b478208ec7b1912530af.jpeg%3Fw%3D1200%26h%3D630%26fit%3Dcrop%26crop%3Dentropy%26auto%3Dcompress%2Cformat%26format%3Dwebp%26fm%3Dpng
    • og:title
      Breaking down the Node.js sandbox bypass CVE-2023-30587
    • og:description
      Turns out, a lot of people want to try to safely run untrusted code, and that's hard. Pixee Engineer Matt Austin (@mattaustin) recently found a bypass of the new and experimental Node.js sandbox in versions before 20.3.1, and it just received a $3K a...
    • og:site_name
      Pixee Blog
    • og:type
      article
  • Link Tags

    9
    • alternate
      https://blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587/rss.xml
    • author
      https://hashnode.com/@nahsra
    • canonical
      https://blog.pixee.ai/breaking-down-the-nodejs-sandbox-bypass-cve-2023-30587
    • icon
      https://cdn.hashnode.com/res/hashnode/image/upload/v1691122575826/XHurqyZ3h.png?auto=compress,format&format=webp&fm=png
    • preload
      https://cdn.hashnode.com/res/hashnode/image/upload/v1691122903061/ZCPa1Nw0M.png?w=1000&h=250&auto=compress,format&format=webp

Links

20