Event JSON
{
"id": "c06c166dc92bc581c7eeeba5dc72707836e953f9ca42d24433735233ed58b27c",
"pubkey": "f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"created_at": 1704911164,
"kind": 1,
"tags": [
[
"e",
"167d25b7e379b2d2e9282bf4c001310772e26e9ccb4a661e83532a34ce89f5c6",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://cyberplace.social/users/GossiTheDog/statuses/111733058062832075",
"activitypub"
]
],
"content": "This is definitely being actively used in the wild - Ivanti have opted to hide that part behind a paywall. Paywall link: https://forums.ivanti.com/s/article/KB-CVE-2023-46805-Authentication-Bypass-CVE-2024-21887-Command-Injection-for-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Gateways",
"sig": "7bb0cb780fa7690a792ab060a8b62f2005ede93a34d5606aeeb1f40dd9f5df9eb30e89f85ebc1e8ad4fef1274831eb5da55b03287b3ca76525819211f1ba76e4"
}