social.coop: About · Status · Profiles directory · Privacy policy
Mastodon: About · Get the app · Keyboard shortcuts · View source code · v4.3.4
After quite some trying, I finally was able to get Spring-boot to be vulnerable to CVE-2025-24813, see https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
Prerequisites are:
File-based session persistence using PersistentManager and FileStore
Re-enable the defaultServlet(server.servlet.register-default-servlet=true)
Read-only mode disabled for the default servlet (readonly=false)
Unlikely, Probably :) Possible definitely!
#CVE-2025-24813
This week in #FDroid (TWIF) is live:
- Client 1.22.0 is now suggested for all
- #Element fixes a #CVE
- #SessionMessenger enables Groups v2
- #SimpleX improves group management
- 10 new apps
- 110 updates
all right here https://f-droid.org/2025/03/20/twif.html
CVE-2025-1232 - "WordPress Site Reviews Stored XSS Vulnerability" March 19, 2025 at 06:15AM https://ift.tt/JFaxqWB #CVE #IOC #CTI #ThreatIntelligence #ThreatIntel #Cybersecurity #Recon
Mastodon is the best way to keep up with what's happening.
Follow anyone across the fediverse and see it all in chronological order. No algorithms, ads, or clickbait in sight.
Login