sudo apt-get updatesudo apt-get install -y libssl1.0.0 opensslopenssl version -aand confirm the "built on" date is >= 2014-04-07sudo lsof -n | grep ssl | grep DELand restart all listed services.
Repeat #4 until no results are returned.
| fs = require 'fs' | |
| {spawn, exec} = require 'child_process' | |
| express = require 'express' | |
| app = express() | |
| app.configure -> | |
| app.use express.bodyParser() | |
| 01net.com:443 - VULNERABLE | |
| 1001freefonts.com:443 - VULNERABLE | |
| 123contactform.com:443 - VULNERABLE | |
| 123rf.com:443 - VULNERABLE | |
| 18qt.com:443 - VULNERABLE | |
| 1fichier.com:443 - VULNERABLE | |
| 24tv.ua:443 - VULNERABLE | |
| 444.hu:443 - VULNERABLE | |
| 518.com.tw:443 - VULNERABLE | |
| 55188.com:443 - VULNERABLE |
| // | |
| // Usage: require('./pid')("myapp"); | |
| // | |
| var fs = require('fs'); | |
| module.exports = function(appname){ | |
| process.title = appname; | |
| var PID_FILE = "/usr/local/var/run/"+process.title+".pid"; |
| /** | |
| * Gets the mime type of the embedded or inline image | |
| * @access private | |
| * @return mime type of ext | |
| */ | |
| function _mime_types($ext = '') { | |
| $mimes = array( | |
| 'ai' => 'application/postscript', | |
| 'aif' => 'audio/x-aiff', | |
| 'aifc' => 'audio/x-aiff', |
| module.exports = (subject = module.parent) -> | |
| console.log 'globalist', subject.id | |
| (require 'pkginfo') subject | |
| {dependencies} = subject.exports | |
| for dependency, version of dependencies then do (dependency, version) -> | |
| console.log 'globalising', dependency | |
| Object.defineProperty global, dependency, configurable: yes, get: -> |