Experimental browser for the Atmosphere
We share IP level data on CVE-2025-22467 in our Vulnerable HTTP report for your network/constituency: www.shadowserver.org/what-we-do/n... Not receiving our free daily feeds? Subscribe here: www.shadowserver.org/what-we-do/n...
Feb 25, 2025, 8:25 PM
{ "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lizp36clfk2d", "cid": "bafyreibu36n4nqkufic4tafnwr5cdtjyhmj22b5hwxd6was4v2nfirrwsq", "value": { "text": "We share IP level data on CVE-2025-22467 in our Vulnerable HTTP report for your network/constituency: www.shadowserver.org/what-we-do/n...\n\nNot receiving our free daily feeds? Subscribe here: www.shadowserver.org/what-we-do/n...", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.external", "external": { "uri": "https://www.shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/", "title": "CRITICAL: Vulnerable HTTP Report | The Shadowserver Foundation", "description": "DESCRIPTION LAST UPDATED: 2025-02-22 DEFAULT SEVERITY LEVEL: CRITICAL This report identifies hosts that have the Hypertext Transfer Protocol (HTTP) service running on some port that may have a vulnera..." } }, "langs": [ "en" ], "reply": { "root": { "cid": "bafyreic2kmay767wxb653w45j3lvmue2ehieo27zrsq2qazearmuvvdy2y", "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lizp2oocmc2d" }, "parent": { "cid": "bafyreiciqpmrk3y44w6eswepajk5k3ihmimg5tqfzfdphadshkyzhkxiw4", "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lizp36ckgc2d" } }, "facets": [ { "index": { "byteEnd": 138, "byteStart": 102 }, "features": [ { "uri": "https://www.shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/", "$type": "app.bsky.richtext.facet#link" } ] }, { "index": { "byteEnd": 228, "byteStart": 192 }, "features": [ { "uri": "https://www.shadowserver.org/what-we-do/network-reporting/get-reports/", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-02-25T20:25:17.238Z" } }