Event JSON
{
"id": "e0e497841cd7a5ac02ce3fd35e83c715dd2d519c428025b2ab79cf3232698ddc",
"pubkey": "93a2808727d996d6d2023059db190583df66981b6ec3e35187ab9fc1cc8e8928",
"created_at": 1698343554,
"kind": 1,
"tags": [
[
"p",
"f7d0478e54eaa6e0cc98adf81d712148bce169a2c21b1c0f7a4ed446c6adc09e",
"wss://relay.mostr.pub"
],
[
"p",
"f6870afcde4480ec8508f50304859e14a51309ff24ab3f0f862c52bdc4af8747",
"wss://relay.mostr.pub"
],
[
"e",
"e98051dff2fdb3f6dc44dd8abf4a75af303c205e1d18a5bddd493282c9ccf782",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://infosec.exchange/users/bontchev/statuses/111302643187576621",
"activitypub"
]
],
"content": "nostr:npub17lgy0rj5a2nwpnyc4hup6ufpfz7wz6dzcgd3crm6fm2yd34dcz0qlk9uux This is a joke, right?\n\nIf not, surely you can do better than forcing the user to edit manually the IP to scan each time? Although bonus points for requesting only the header response.\n\nIf one doesn't mind actually exploiting the vulnerability for the purpose of scanning (I do), a more professional one can be found here:\n\nhttps://github.com/Chocapikk/CVE-2023-4966",
"sig": "ac5c7aad8370eba0d94ece0a109d3d433b1cfbaec7ec554a9922109739ff1eb6c92f9d9c84364c4f47def3128423fe3a25d3e8a99d790b94031d0fd39ba86a2e"
}