ATProto Browser

ATProto Browser

Experimental browser for the Atmosphere

Post

Data is shared in the Vulnerable HTTP report & tagged as `possible-cve-2025-1974`. Note that the validating Admission Controller should not be exposed to the Internet regardless of any additional vulnerabilities! We also report these out in our Device Identification report.

Mar 27, 2025, 1:22 PM

Record data

{
  "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3llefgfqlis2d",
  "cid": "bafyreiflqtkwn5ndih37qyji6qdsb3ulwj6lcl7o7fzhdd4725kqkitlf4",
  "value": {
    "text": "Data is shared in the Vulnerable HTTP report & tagged as `possible-cve-2025-1974`. Note that the validating Admission Controller should not be exposed to the Internet regardless of any additional vulnerabilities! We also report these out in our Device Identification report.",
    "$type": "app.bsky.feed.post",
    "embed": {
      "$type": "app.bsky.embed.external",
      "external": {
        "uri": "https://www.shadowserver.org/what-we-do/network-reporting/vulnerable-http-report/",
        "title": "CRITICAL: Vulnerable HTTP Report | The Shadowserver Foundation",
        "description": "DESCRIPTION LAST UPDATED: 2025-03-27 DEFAULT SEVERITY LEVEL: CRITICAL This report identifies hosts that have the Hypertext Transfer Protocol (HTTP) service running on some port that may have a vulnera..."
      }
    },
    "langs": [
      "en"
    ],
    "reply": {
      "root": {
        "cid": "bafyreifsev77ttiw5exlby3rebntqf4s4l6qdp5vqrjoziis5uslwyanfi",
        "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3llefgcpurk2d"
      },
      "parent": {
        "cid": "bafyreifsev77ttiw5exlby3rebntqf4s4l6qdp5vqrjoziis5uslwyanfi",
        "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3llefgcpurk2d"
      }
    },
    "createdAt": "2025-03-27T13:22:30.323Z"
  }
}