Event JSON
{
"id": "974964cf504058af277dfc93374b6ee32d72453da929e01d1d2bd8409cac1ed9",
"pubkey": "00a3e3e90093e46e7a730659a3a92b13ab498d1e47b0eefbb284b92ba6194b43",
"created_at": 1734972092,
"kind": 1,
"tags": [
[
"p",
"74d972ae87ff9199eb1e4aec71152d6c71d05eb26fa09aedbba04eca7c4ffc93",
"wss://relay.mostr.pub"
],
[
"p",
"979a28fa43702f9be4e468836a5b120cc4265237f4295fcb4a9b28e2a71d1c6b",
"wss://relay.mostr.pub"
],
[
"t",
"cybersecurity"
],
[
"t",
"infosec"
],
[
"proxy",
"https://infosec.exchange/users/AAKL/statuses/113703131059088735",
"activitypub"
]
],
"content": "Apache fixes remote code execution bypass in Tomcat web server https://www.bleepingcomputer.com/news/security/apache-fixes-remote-code-execution-bypass-in-tomcat-web-server/ nostr:nprofile1qy2hwumn8ghj7un9d3shjtnddaehgu3wwp6kyqpqwnvh9t58l7gen6c7ftk8z9fdd3caqh4jd7sf4mdm5p8v5lz0ljfs9nkxpq \n\nApache advisory: CVE-2024-56337 Apache Tomcat - RCE via write-enabled default servlet - CVE-2024-50379 mitigation was incomplete https://lists.apache.org/thread/b2b9qrgjrz1kvo4ym8y2wkfdvwoq6qbp #cybersecurity #infosec",
"sig": "cbbafdb540f34193be45cbdb0efa71dfe56d59420ceac788d8565d4990834a336d1a12caef06ff6f679c39ccd773037662c184bc42342688a12febddb36e7e98"
}