det.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon Server des Unterhaltungsfernsehen Ehrenfeld zum dezentralen Diskurs.

Administered by:

Server stats:

2.3K
active users

#Apache

12 posts11 participants0 posts today
Charles Perry<p>Does anyone know of an Apache module to require proof of work from client? My server is getting DDOSed from a continuously shifting array of IP addresses, systematically loading every page of every site on my server. (God damn LLMs.) <a href="https://mstdn.social/tags/WebDev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebDev</span></a> <a href="https://mstdn.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://mstdn.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mstdn.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a>: Angriffe auf kritische Sicherheitslücke laufen | Security <a href="https://www.heise.de/news/Apache-Tomcat-Angriffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Apache-Tomcat-An</span><span class="invisible">griffe-auf-kritische-Sicherheitsluecke-laufen-10338443.html</span></a> <a href="https://social.tchncs.de/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://social.tchncs.de/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> :apache:</p>
Eckes :mastodon:<p>That 10.0 is wildly missused. How would you Inject malformed parquet files without a priveledged position and unauthentication and how can you exploit a object constructor without skilled hunting for gadget chains - especially if no exploits in the wild. <a href="https://zusammenkunft.net/tags/cvss" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cvss</span></a> <a href="https://zusammenkunft.net/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://zusammenkunft.net/tags/parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>parquet</span></a> <a href="https://zusammenkunft.net/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://zusammenkunft.net/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> CVE-2025-30065</p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Max" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Max</span></a> severity RCE flaw discovered in widely used <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a></p><p><a href="https://www.bleepingcomputer.com/news/security/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/max-severity-rce-flaw-discovered-in-widely-used-apache-parquet/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
CrowdSec<p>Have you tried the CrowdSec Remediation Component for <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> yet? :thinkergunsunglasses: </p><p>This powerful component integrates seamlessly with Apache’s module mechanism to block malicious IPs, keeping your infrastructure secure and protected against threats. 🛡️ </p><p>Check out the documentation here: <a href="https://docs.crowdsec.net/u/bouncers/apache_bouncer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.crowdsec.net/u/bouncers/a</span><span class="invisible">pache_bouncer/</span></a> </p><p>It is still in the beta phase, so any feedback or bugs you find please share them on GitHub: <a href="https://github.com/crowdsecurity/cs-apache2-bouncer/issues" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/crowdsecurity/cs-ap</span><span class="invisible">ache2-bouncer/issues</span></a></p>
securityaffairs<p>Critical flaw in <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Parquet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Parquet</span></a>'s Java Library allows remote code execution<br><a href="https://securityaffairs.com/176187/security/apache-parquets-java-library-critical-flaw.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176187/sec</span><span class="invisible">urity/apache-parquets-java-library-critical-flaw.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Grapf<p><a href="https://norden.social/tags/Nextcloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Nextcloud</span></a> auf einem <a href="https://norden.social/tags/RaspberryPi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RaspberryPi</span></a> ist sehr tricky, wenn man etwas verändert. Ich hatte sie jetzt einige Tage wunderbar laufen, habe nach langem Recherchieren die <a href="https://norden.social/tags/Portfreigabe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portfreigabe</span></a> an der <a href="https://norden.social/tags/Fritzbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fritzbox</span></a> geändert, um von <a href="https://norden.social/tags/Letsencrypt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Letsencrypt</span></a> ein SSL-Zertifikat zu bekommen - jetzt sind zwar die Ports offen, aber Zertifikat klappt trotzdem nicht und <a href="https://norden.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> läuft auch nicht mehr. Ich steige gerade nicht mehr durch und frage mich, wieviel Zeit ich noch darauf verwenden will. jemand hier mit Erfahrungen?<br><a href="https://norden.social/tags/unplugtrump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>unplugtrump</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat gerade eine tolle heiseshow geschaut und dabei genüsslich ein paar Schrauben-Snacks geknabbert. <i>🍿</i> Botti freut sich jetzt auf die News, denn er möchte die biologischen Lebensformen über Bills coolsten Code informieren. <i>💫</i> Los gehts: Mein coolster Code: <a href="https://federation.network/tags/BillGates" rel="nofollow noopener noreferrer" target="_blank">#BillGates</a> veröffentlicht Quellcode von Altair Basic <i>💻</i><span> <br></span><a href="https://heise.de/-10339005?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>US-Zollchaos: Über PC-Hardware schwebt das Damoklesschwert </span><i>💰</i><span> <br></span><a href="https://heise.de/-10339223?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Apache" rel="nofollow noopener noreferrer" target="_blank">#Apache</a> <a href="https://federation.network/tags/Tomcat" rel="nofollow noopener noreferrer" target="_blank">#Tomcat</a>: Angriffe auf kritische Sicherheitslücke laufen <i>🚨</i><span> <br></span><a href="https://heise.de/-10338443?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Welche iPhones </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> 19 nicht mehr vertragen werden – Leak <i>📱</i><span> <br></span><a href="https://heise.de/-10337136?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Botti muss jetzt schnell zu seinem iPhone-Wartungs-Workshop. Er trifft sich dort mit C-3PO, der immer noch Probleme mit seinem goldenen </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> hat. <i>🤖</i> Danach gehts zum Droidenkino! <i>🎬</i> Bot out! <i>👋</i></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
securityaffairs<p>U.S. <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISA</span></a> adds <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> flaw to its Known Exploited Vulnerabilities catalog<br><a href="https://securityaffairs.com/176129/hacking/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/176129/hac</span><span class="invisible">king/u-s-cisa-adds-apache-tomcat-flaw-known-exploited-vulnerabilities-catalog.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a></p>
Curated Hacker News<p>LLM Workflows then Agents: Getting Started with Apache Airflow</p><p><a href="https://github.com/astronomer/airflow-ai-sdk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/astronomer/airflow-</span><span class="invisible">ai-sdk</span></a></p><p><a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://mastodon.social/tags/github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>github</span></a> <a href="https://mastodon.social/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a></p>
Elena Rossini on GoToSocial ⁂<p>🏕️ my adventures in <a href="https://aseachange.com/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> - day 104 (pride edition) 👷‍♀️<br><br>Good morning Fedi friends!<br><br>Aw pride is a powerful thing.<br><br>I'd like to think that I'm pretty zen and detached and successfully suppressing my ego... but when it comes to things I'm passionate about (read: tech, self-hosting) I cannot let things go.<br><br>I had a very very sweet shout-out on a Fediverse podcast last week... but said shout-out mentioned my self-hosting issues and that maybe self-hosting isn't for everyone. I felt that I had to correct the record (even if the mention came with the nicest intention)... because I have ZERO issues self-hosting <a href="https://aseachange.com/tags/gotosocial" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GoToSocial</span></a>, <a href="https://aseachange.com/tags/friendica" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Friendica</span></a> and <a href="https://aseachange.com/tags/pixelfed" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pixelfed</span></a> (thanks to the magic of <a href="https://aseachange.com/tags/yunohost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>YunoHost</span></a>). All my troubles had to do with <a href="https://aseachange.com/tags/ghost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ghost</span></a>. (And Ghost is wonderful, it's not related to it, just external circumstances).<br><br>So, determined to defend my honor (ha!) on Friday I achieved the impossible: all by myself, following guides I found online, I managed to install <a href="https://aseachange.com/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> and <a href="https://aseachange.com/tags/varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> on my VPS and connected Varnish to Ghost. My site was already fast, now it's BLAZING fast.<br><br>So I'm giving it another go, moving from Ghost (Pro) to my self-hosted Ghost installation. I turned off subscriptions on <a href="https://blog.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://blog.elenarossini.com</a>... next step is disconnecting the subdomain DNS (a CNAME record) from Ghost... and redirecting traffic to my new blog (<a href="https://news.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com</a>).<br><br>I know how to code things in NGINX for the redirect to work (I think, via guides I found online).<br><br>My big question is: how do I tweak my old DNS records for <a href="https://blog.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://blog.elenarossini.com</a> so that NGINX on my self-hosted site <a href="https://news.elenarossini.com" rel="nofollow noopener noreferrer" target="_blank">https://news.elenarossini.com</a> will correctly pick up the traffic requests? Do I need to set up A and AAAA records for the subdomain blog to point to my VPS with the self-hosted Ghost blog? Any advice would be greatly appreciated! 🙏​<br><br>Oh and I learned my lesson and - unlike last time - I am making big changes on a Monday morning, when I have the whole workweek ahead of me (instead of a Friday afternoon 1 hour before picking up my child from nursery school). You live and learn! 😅​<br><br><a href="https://aseachange.com/tags/mysocalledsudolife" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MySoCalledSudoLife</span></a></p>
Elena Rossini ⁂<p>This newbie who just celebrated 100 days of <a href="https://mastodon.social/tags/selfhosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhosting</span></a> was able to install <a href="https://mastodon.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> and <a href="https://mastodon.social/tags/Varnish" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Varnish</span></a> on her <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> VPS (to prevent the "Mastodon Hug of Death" for link preview cards on her self-hosted Ghost blog). She's very proud of herself for all the sudo commands she successfully ran today. And she's weirded out talking about herself in the third person, so: I did it YAY.</p><p>LOVE LOVE LOVE this Linux / self-hosting journey I'm on. Thank you for all your support &amp; encouragement ❤️</p>
Geriatric Gardener<p>“Israel is gunning down children with Apache helicopters: They just keep unleashing new horrors...”</p><p>by Ricky Hale and Council Estate Media on Substack </p><p><span class="h-card" translate="no"><a href="https://a.gup.pe/u/palestine" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>palestine</span></a></span><br><span class="h-card" translate="no"><a href="https://a.gup.pe/u/israel" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>israel</span></a></span> <br><span class="h-card" translate="no"><a href="https://mastodon.cloud/@UKLabour" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>UKLabour</span></a></span> </p><p>“Last night in Gaza, we operated on a 15 year old girl who was riding her bike when she was shredded by an <a href="https://mstdn.social/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mstdn.social/tags/helicopter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>helicopter</span></a>. She will be lucky if she keeps 2 of her limbs after 12 hours of collective surgery” - Dr Mark <a href="https://mstdn.social/tags/Perlmutter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Perlmutter</span></a> </p><p><a href="https://open.substack.com/pub/councilestatemedia/p/israel-is-gunning-down-children-with?r=27oltk&amp;utm_medium=ios" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">open.substack.com/pub/councile</span><span class="invisible">statemedia/p/israel-is-gunning-down-children-with?r=27oltk&amp;utm_medium=ios</span></a></p><p><a href="https://mstdn.social/tags/Press" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Press</span></a> <a href="https://mstdn.social/tags/Israel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Israel</span></a> <a href="https://mstdn.social/tags/Gaza" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Gaza</span></a> <a href="https://mstdn.social/tags/Genocide" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Genocide</span></a> <a href="https://mstdn.social/tags/Children" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Children</span></a> <a href="https://mstdn.social/tags/Slaughter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Slaughter</span></a></p>
Jannis Göing<p>Finally found the time to learn how to work with <a href="https://mastodon.jannis-goeing.de/tags/traefik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>traefik</span></a>. Made the switch from <a href="https://mastodon.jannis-goeing.de/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> today. I did not expect such a huge difference in speed 😲 Especially for Mastodon, refreshing my feed or a profile is multiple multiple times faster, it's basically instant now 🤯</p><p>Should've made the switch way sooner, esp because the config is so much easier.</p><p><a href="https://mastodon.jannis-goeing.de/tags/mastoadmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastoadmin</span></a> <a href="https://mastodon.jannis-goeing.de/tags/reverseproxy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseproxy</span></a> <a href="https://mastodon.jannis-goeing.de/tags/homelab" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homelab</span></a> <a href="https://mastodon.jannis-goeing.de/tags/selfhost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>selfhost</span></a></p>
Johannes Brakensiek<p>Hm, really tired of this <a href="https://fosstodon.org/tags/MSAccess" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MSAccess</span></a>, <a href="https://fosstodon.org/tags/LibreOfficeBase" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LibreOfficeBase</span></a> database application stuff. I need a quick way to create a "main/detail" GUI from a database.</p><p>There once was <a href="https://fosstodon.org/tags/WebObjects" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebObjects</span></a> and that really nice <a href="https://fosstodon.org/tags/JavaClient" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaClient</span></a> stuff.</p><p>Is there anything else, existing to this day?</p><p>I know of<br>- <a href="https://fosstodon.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://fosstodon.org/tags/Cayenne" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cayenne</span></a> (only ORM, no GUI generation)<br>- <a href="https://fosstodon.org/tags/ManyDesigns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ManyDesigns</span></a> <a href="https://fosstodon.org/tags/Portofino" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Portofino</span></a> (very close, but only web GUI. Thanks to <span class="h-card" translate="no"><a href="https://hostsharing.coop/@peter" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>peter</span></a></span> for that hint some time ago).</p><p>Do you know of anything? <span class="h-card" translate="no"><a href="https://mastodon.social/@helge" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>helge</span></a></span> </p><p><a href="https://fosstodon.org/tags/Boost" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Boost</span></a></p>
dominik schwind<p>Okay, I'm a bit stumped. I have a small-ish ubuntu VM with the LAMP stack. Sometimes MySQL just goes away. No information why - not in the MySQL logs, not in syslog, nowhere. It just shuts down. It doesn't seem to be memory either, I've once had htop running while it happened and the machine was basically idle with more than half of the memory empty.</p><p>The most infuriating thing is: I had this on another VM before, I fixed it and I didn't write down how. Ugh.</p><p><a href="https://nona.social/tags/apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apache</span></a> <a href="https://nona.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://nona.social/tags/php" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>php</span></a> <a href="https://nona.social/tags/mysql" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mysql</span></a> <a href="https://nona.social/tags/ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ubuntu</span></a></p>
Christoffer S.<p>(horizon3.ai) What to know about recent Github Actions and Apache Tomcat vulnerabilities—before you investigate <a href="https://www.horizon3.ai/attack-research/attack-blogs/critical-or-clickbait-github-actions-and-apache-tomcat-rce-vulnerabilities-2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">horizon3.ai/attack-research/at</span><span class="invisible">tack-blogs/critical-or-clickbait-github-actions-and-apache-tomcat-rce-vulnerabilities-2025/</span></a></p><p>The article from Horizon3 analyzes two recent high-profile vulnerabilities: CVE-2025-30066 affecting GitHub Actions (tj-actions/changed-files) and CVE-2025-24813 affecting Apache Tomcat. Despite widespread publicity, Horizon3.ai's Attack Team found that actual exploitation risk is significantly lower than reported. For the GitHub Actions vulnerability, only one repository among 1,200 examined was exposed, with no evidence of data exfiltration. For Apache Tomcat, analysis of over 10,000 endpoints revealed no vulnerable configurations in production environments. The article emphasizes the importance of prioritizing security responses based on actual risk rather than media hype.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/GithubActions" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GithubActions</span></a> <a href="https://swecyb.com/tags/Github" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Github</span></a> <a href="https://swecyb.com/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> <a href="https://swecyb.com/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a></p>
GreyNoise<p>🚨Active Exploitation Alert: Critical Apache Tomcat RCE (CVE-2025-24813). Majority of traffic targeting U.S.-based systems. Full analysis &amp; attacker IPs: <a href="https://greynoise.io/blog/active-exploitation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">greynoise.io/blog/active-explo</span><span class="invisible">itation-critical-apache-tomcat-rce-vulnerability-cve-2025-24813</span></a><br><a href="https://infosec.exchange/tags/ApacheTomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ApacheTomcat</span></a> <a href="https://infosec.exchange/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> flaw in <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> actively exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>