Experimental browser for the Atmosphere
Background details on CVE-2025-31324: redrays.io/blog/critica...
Apr 27, 2025, 4:31 PM
{ "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lnsog3ru622t", "cid": "bafyreih53nbbdzslecsc6bfalcxne4x7wnwkpovq52kuje37lvgzsg3fdi", "value": { "text": "Background details on CVE-2025-31324: redrays.io/blog/critica...", "$type": "app.bsky.feed.post", "embed": { "$type": "app.bsky.embed.external", "external": { "uri": "https://redrays.io/blog/critical-sap-netweaver-vulnerability-cve-2025-31324-fixed-actively-exploited-in-the-wild/", "thumb": { "$type": "blob", "ref": { "$link": "bafkreifkbxe4zsju5lusywdkb7kp7exs2ksaznvdabl7xp6fwbwryb45pu" }, "mimeType": "image/jpeg", "size": 238713 }, "title": "Critical SAP NetWeaver Vulnerability (CVE-2025-31324) Fixed: Actively Exploited in the Wild", "description": "Critical SAP NetWeaver vulnerability (CVE-2025-31324) with CVSS 10.0 allows remote code execution via file upload. Patch immediately - active exploits detected in the wild." } }, "langs": [ "en" ], "reply": { "root": { "cid": "bafyreiall62fbh7ra7r3twzdcxe5ecigrkhpgbpmewei4kkjl77hmj6eh4", "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lnsofzevbk2t" }, "parent": { "cid": "bafyreifl7zb5ew3a6xua4cggr6oayd5uzlo7rumwekyvxwke4lcpa2pq2u", "uri": "at://did:plc:3xyh2kw5hfxsax4zff3pp5ub/app.bsky.feed.post/3lnsog3rt6s2t" } }, "facets": [ { "index": { "byteEnd": 64, "byteStart": 38 }, "features": [ { "uri": "https://redrays.io/blog/critical-sap-netweaver-vulnerability-cve-2025-31324-fixed-actively-exploited-in-the-wild/", "$type": "app.bsky.richtext.facet#link" } ] } ], "createdAt": "2025-04-27T16:31:03.793Z" } }