On Thu, Sep 7, 2017 at 5:29 PM, Christopher Schultz
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Chris,
>
> On 9/5/17 3:39 PM, Chris Cheshire wrote:
>> On Tue, Sep 5, 2017 at 2:07 PM, Christopher Schultz
>>> If I were king, I'd set things up like this:
>>>
>>> 1. Tomcat is instal
On Thu, Sep 7, 2017 at 5:30 PM, Christopher Schultz
wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
> Chris,
>
> On 9/5/17 4:42 PM, Chris Cheshire wrote:
>> On Tue, Sep 5, 2017 at 2:07 PM, Christopher Schultz
>> wrote:
>>> If I were king, I'd set things up like this:
>>>
>>> 1. Tomca
In tomcat8, how do I go about configuring a Resources element to
replace mod_alias directives in httpd?
Currently my mod_alias config for httpd has
AliasMatch ^/images/(.*)$ /var/cdn/sandbox1/images/$1
AliasMatch ^/(.*)/images/(.*)$ /var/cdn/sandbox1-$1/images/$2
Order allow
I really can't believe I didn't think about the possibility that my
browsers were both still caching the default root context from Tomcat 7
when I did the port swap.
I definitely need to always remember to consider the possibility that
I'm doing something stupid.
--
JHHL
--
Do you know where the JAVA_HOME points to? Maybe it has switched to a
later java version in the upgrade.
>From memory (it's been a while)
If you do wrkenvvar (F4) and select *SYS and scroll for the JAVA_HOME.
or STRQSH and run java -version will also display the version.
On 8 September 20
Hi,
Below error messages are recorded in the log txt files. Please find the
details.
Aug 23, 2017 9:36:32 AM org.apache.coyote.http11.Http11Protocol
init
INFO: Initializing Coyote HTTP/1.1 on port
8180
Starting service
Tomcat-Standalone
Apache
Tomcat/4.1.30
Aug 23, 2017 9:36:33 AM org.apache.co
Hi Markus ,
Thanks. So can I rephrase that unless we add/deploy struts
applications/libraries on Tomcat , vanilla installed Tomcat is not impacted by
the mentioned vulnerability in Struts?
-Original Message-
From: i...@flyingfischer.ch [mailto:i...@flyingfischer.ch]
Sent: Friday, 8
On 08/09/17 09:59, Billy Aung Myint wrote:
> Hi Everyone,
>
> May I know if Tomcat 7.x version is affected by the Apache Struts 2
> vulnerability?
Which one? I'm guessing you mean CVE-2017-9805. It actually doesn't
matter in this case but security vulnerabilities are given identifiers
exactly so
Am 08.09.2017 um 10:59 schrieb Billy Aung Myint:
> Hi Everyone,
>
> May I know if Tomcat 7.x version is affected by the Apache Struts 2
> vulnerability?
> I mean does Tomcat uses any of the Struts' libraries or such in any part of
> the Tomcat?
>
> Thanks!
>
Tomcat is affected by Tomcat vulnerabi
Hi Everyone,
May I know if Tomcat 7.x version is affected by the Apache Struts 2
vulnerability?
I mean does Tomcat uses any of the Struts' libraries or such in any part of the
Tomcat?
Thanks!
Java 1.4 should still be available, check your software resources and 5761-JV1
options and the environment variable JAVA_HOME.
https://www.ibm.com/support/knowledgecenter/ssw_ibm_i_71/rzaha/rzahainstalljdk.htm
On 7 September 2017 at 15:56, André Warnier (tomcat) wrote:
> On 07.09.2017 16:21,
11 matches
Mail list logo