{
"id":"1b7f0517eb67e91bed68beb58e739034fc6d74f903e3d8409bf5b77570176e6e",
"pubkey":"3b5fd1b98a2d38f8a5a7551ac9d337e8d265506b1db3b4a4d3e8cad14cea68d7",
"created_at":1723486176,
"kind":1,
"tags": [
[
"t",
"openssh"
],
[
"t",
"freebsd"
],
[
"t",
"vulnerability"
],
[
"proxy",
"https://infosec.exchange/users/securestep9/statuses/112950390050654636",
"activitypub"
]
],
"content":"#OpenSSH: if you are using SSH on #FreeBSD you need to patch it immediately! Critical #vulnerability CVE-2024-7589 allows attackers to execute remote code without authentication:\n👇\nhttps://thehackernews.com/2024/08/freebsd-releases-urgent-patch-for-high.html\n\nhttps://media.infosec.exchange/infosec.exchange/media_attachments/files/112/950/390/040/061/714/original/5dd62b8985d957e2.jpg",
"sig":"44a2d4647ce83e765b7a5b01a17b6812b9e7fadf1f83768c4452369ce5dee49853b896fd9b0e68ff123940041725ef7a68fe582144af3d3d56b463343f4046e1"
}