ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577", "type": "Note", "summary": null, "inReplyTo": null, "published": "2024-06-11T17:13:37Z", "url": "https://infosec.exchange/@screaminggoat/112599106666438577", "attributedTo": "https://infosec.exchange/users/screaminggoat", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/screaminggoat/followers", "https://infosec.exchange/users/regnil", "https://infosec.exchange/users/cR0w", "https://infosec.exchange/users/bschwifty", "https://infosec.exchange/users/arinc629", "https://infosec.exchange/users/Cali", "https://infosec.exchange/users/wvu", "https://mastodon.social/users/hrbrmstr", "https://infosec.exchange/users/avoidthehack", "https://infosec.exchange/users/bieberium" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2024-06-11:objectId=166832790:objectType=Conversation", "content": "<p>Happy Patch Tuesday from <strong>Microsoft</strong>: 51 vulnerabilities, one is publicly disclosed:<br>MITRE: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50868\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-50868</a> (7.5 high) NSEC3 closest encloser proof can exhaust CPU. CVE-2023-50868 is regarding a vulnerability in DNSSEC validation where an attacker could exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users. MITRE created this CVE on their behalf.</p><p>If you consider a publicly disclosed vulnerability a zero-day, that's the takeaway for Microsoft releases. No mention of exploitation for everything else. Checked against the actual MSRC Security Update Guide: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">msrc.microsoft.com/update-guid</span><span class=\"invisible\">e/vulnerability</span></a></p><p>cc: <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@regnil\" class=\"u-url mention\">@<span>regnil</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bschwifty\" class=\"u-url mention\">@<span>bschwifty</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@arinc629\" class=\"u-url mention\">@<span>arinc629</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Cali\" class=\"u-url mention\">@<span>Cali</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@wvu\" class=\"u-url mention\">@<span>wvu</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@hrbrmstr\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>hrbrmstr</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@avoidthehack\" class=\"u-url mention\">@<span>avoidthehack</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bieberium\" class=\"u-url mention\">@<span>bieberium</span></a></span> (make sure to remove all the mentions to avoid ReplyAll madness)</p><p><a href=\"https://infosec.exchange/tags/PatchTuesday\" class=\"mention hashtag\" rel=\"tag\">#<span>PatchTuesday</span></a> <a href=\"https://infosec.exchange/tags/Microsoft\" class=\"mention hashtag\" rel=\"tag\">#<span>Microsoft</span></a> <a href=\"https://infosec.exchange/tags/MSRC\" class=\"mention hashtag\" rel=\"tag\">#<span>MSRC</span></a> <a href=\"https://infosec.exchange/tags/vulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerability</span></a> <a href=\"https://infosec.exchange/tags/CVE\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE</span></a> <a href=\"https://infosec.exchange/tags/CVE_2023_50868\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE_2023_50868</span></a></p>", "contentMap": { "en": "<p>Happy Patch Tuesday from <strong>Microsoft</strong>: 51 vulnerabilities, one is publicly disclosed:<br>MITRE: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50868\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE-2023-50868</a> (7.5 high) NSEC3 closest encloser proof can exhaust CPU. CVE-2023-50868 is regarding a vulnerability in DNSSEC validation where an attacker could exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users. MITRE created this CVE on their behalf.</p><p>If you consider a publicly disclosed vulnerability a zero-day, that's the takeaway for Microsoft releases. No mention of exploitation for everything else. Checked against the actual MSRC Security Update Guide: <a href=\"https://msrc.microsoft.com/update-guide/vulnerability\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"ellipsis\">msrc.microsoft.com/update-guid</span><span class=\"invisible\">e/vulnerability</span></a></p><p>cc: <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@regnil\" class=\"u-url mention\">@<span>regnil</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@cR0w\" class=\"u-url mention\">@<span>cR0w</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bschwifty\" class=\"u-url mention\">@<span>bschwifty</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@arinc629\" class=\"u-url mention\">@<span>arinc629</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@Cali\" class=\"u-url mention\">@<span>Cali</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@wvu\" class=\"u-url mention\">@<span>wvu</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://mastodon.social/@hrbrmstr\" class=\"u-url mention\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@<span>hrbrmstr</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@avoidthehack\" class=\"u-url mention\">@<span>avoidthehack</span></a></span> <span class=\"h-card\" translate=\"no\"><a href=\"https://infosec.exchange/@bieberium\" class=\"u-url mention\">@<span>bieberium</span></a></span> (make sure to remove all the mentions to avoid ReplyAll madness)</p><p><a href=\"https://infosec.exchange/tags/PatchTuesday\" class=\"mention hashtag\" rel=\"tag\">#<span>PatchTuesday</span></a> <a href=\"https://infosec.exchange/tags/Microsoft\" class=\"mention hashtag\" rel=\"tag\">#<span>Microsoft</span></a> <a href=\"https://infosec.exchange/tags/MSRC\" class=\"mention hashtag\" rel=\"tag\">#<span>MSRC</span></a> <a href=\"https://infosec.exchange/tags/vulnerability\" class=\"mention hashtag\" rel=\"tag\">#<span>vulnerability</span></a> <a href=\"https://infosec.exchange/tags/CVE\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE</span></a> <a href=\"https://infosec.exchange/tags/CVE_2023_50868\" class=\"mention hashtag\" rel=\"tag\">#<span>CVE_2023_50868</span></a></p>" }, "updated": "2024-06-11T17:15:04Z", "attachment": [], "tag": [ { "type": "Mention", "href": "https://infosec.exchange/users/regnil", "name": "@regnil" }, { "type": "Mention", "href": "https://infosec.exchange/users/cR0w", "name": "@cR0w" }, { "type": "Mention", "href": "https://infosec.exchange/users/bschwifty", "name": "@bschwifty" }, { "type": "Mention", "href": "https://infosec.exchange/users/arinc629", "name": "@arinc629" }, { "type": "Mention", "href": "https://infosec.exchange/users/Cali", "name": "@Cali" }, { "type": "Mention", "href": "https://infosec.exchange/users/wvu", "name": "@wvu" }, { "type": "Mention", "href": "https://mastodon.social/users/hrbrmstr", "name": "@hrbrmstr@mastodon.social" }, { "type": "Mention", "href": "https://infosec.exchange/users/avoidthehack", "name": "@avoidthehack" }, { "type": "Mention", "href": "https://infosec.exchange/users/bieberium", "name": "@bieberium" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/patchtuesday", "name": "#patchtuesday" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/microsoft", "name": "#microsoft" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/msrc", "name": "#msrc" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/vulnerability", "name": "#vulnerability" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cve", "name": "#cve" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cve_2023_50868", "name": "#cve_2023_50868" } ], "replies": { "id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies?min_id=112599138016204687&page=true", "partOf": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/replies", "items": [ "https://infosec.exchange/users/screaminggoat/statuses/112599138016204687" ] } }, "likes": { "id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/likes", "type": "Collection", "totalItems": 8 }, "shares": { "id": "https://infosec.exchange/users/screaminggoat/statuses/112599106666438577/shares", "type": "Collection", "totalItems": 3 } }