Event JSON
{
"id": "6e33173292fde24b899618eb2fc9c1776ac79f72ed81b2f2c1426f4c14a77f37",
"pubkey": "30e4a2f3acb279498a7f05638fbc911230aa17a9ce095e56d8b983bacfba1c31",
"created_at": 1726304395,
"kind": 1,
"tags": [
[
"p",
"94d4305126df84d23f4c92119096636bbab3b7759611d943cb76a20edb212c7c",
"wss://relay.mostr.pub"
],
[
"p",
"f176bb1c937595ded0abeb98540367fa01e6a83b0552644e905594548b0d7475",
"wss://relay.mostr.pub"
],
[
"e",
"c58716c8e833038c4022e2e86eb925aec760072e3d67b1a11f4eddc3d5fd1605",
"wss://relay.mostr.pub",
"reply"
],
[
"proxy",
"https://bsd.network/users/solene/statuses/113135084857002258",
"activitypub"
]
],
"content": "nostr:npub1jn2rq5fxm7zdy06vjggep9nrdwat8dm4jcgajs7tw63qakep937qwfyv3v this did not prevent OpenBSD cron from having a privilege escalation to root by editing the crontab as an user last month\n\nhttps://www.supernetworks.org/CVE-2024-43688/openbsd-cron-heap-underflow.txt",
"sig": "03346007c73bab57aadd9c7ea25d497d9fefaf762dd719dd90a571311ddd582b7f7af5d16d48650bf0c95050f0c18725b1220fe9545293b8d9c480d46747de88"
}