Hacker News new | past | comments | ask | show | jobs | submit login

Sigh. I'm glad I didn't give them any billing information (monthly invoice paid each time via Paypal). It's not clear to me how/why root passwords are compromised by this exploit; anyone care to elaborate?



It's talking about the auto-generated root password that gets emailed to you upon creation of your VM initially. Most everyone would, hopefully, have changed his/her root password manually, upon receiving it in email via cleartext.


I'm getting conflicting reports about the passwords. Were these plaintext passwords ONLY the autogenerated ones, or are there other passwords that have been compromised as well. Also, has anyone been able to get a list of everything that was displayed on the page?


Stupidity, or appalling ignorance on the part of the SolusVM developers.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: