Tomcat is using?
Thank you,
-Ragini
-Original Message-
From: Christopher Schultz [mailto:ch...@christopherschultz.net]
Sent: Monday, February 03, 2014 3:42 PM
To: Tomcat Users List
Subject: Re: Tomcat 7 / Java 7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Ragini,
On 2/3/14, 4:19 PM
Java version which is 1.7. Am I
missing anything ?
Thank you,
-Ragini
Hello,
Is Tomcat 7.0.42 compatible with Java
7?<http://stackoverflow.com/questions/9294355/is-tomcat-7-now-compatible-with-java-7>
If yes, do you know if there is something special to migrate an existing
installation of Tomcat 7/Java 6 to Tomcat 7/Java 7?
-Ragini
Hello,
I am trying to install and run my application Tomcat 7.0.42 on RHEL 5.
Installation was correct and I was able to start Tomcat. Now when I place my
application in the webapps folder and add the following to server.xml, my
Tomcat doesn't start.
I have attached the log
On 09/25/2012 03:42 PM, Mark Thomas wrote:
On 25/09/2012 12:15, Ragini wrote:
Hi,
I want to try to exploit tomcat vulnerability CVE-2009-2693. From site
it says that the affected version are from 6.0.0 to 6.0.20. I could not
find any of this on official apache tomcat website. I want to do some
Hi,
I want to try to exploit tomcat vulnerability CVE-2009-2693. From site
it says that the affected version are from 6.0.0 to 6.0.20. I could not
find any of this on official apache tomcat website. I want to do some
tests on that vulnerable versions.
*Could you please guide me from where I
On 09/21/2012 12:46 PM, Mark Thomas wrote:
On 21/09/2012 11:23, Ragini wrote:
I tried this with both tomcat 6.0.35 and tomcat7.0.28 and it actually
deleted the file1.txt from home directory. So I guess I have succeded to
exploit the said "CVE-2009-2693 named *Arbitrary file deletion a
Hi all,
I wanted to exploit tomcat vulnerability CVE-2009-2693 named "*Arbitrary
file deletion and/or alteration on deploy* ". You can have a look on it
here. (http://tomcat.apache.org/security-6.html)
Here they say the affected versions are "Affects: 6.0.0-6.0.20".
I wanted to give it a try.
On 09/19/2012 07:55 PM, Pid * wrote:
On 19 Sep 2012, at 13:20, Daniel Mikusa wrote:
On Sep 19, 2012, at 5:02 AM, Ragini wrote:
Hi all,
For my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java applications can
be
On 09/19/2012 01:49 PM, chris derham wrote:
On Wed, Sep 19, 2012 at 10:02 AM, Ragini wrote:For
my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java applications
can be just any web-application, desktopapplication or any
Hi all,
For my research work I want to have different attacking scenarios which
exploits vulnerability of JAVA based applications. This java
applications can be just any web-application, desktopapplication or any
other.
For this, I was thinking to exploit vulnerabilities of tomcat itself
(b
will appreciate your any help in finding answers
to this questions.
Thanks.
Ragini.
-Xbootclasspath/p:./lib/Thread_JP2.jar:lib/jborat-runtime.jar:lib/jp2-runtime.jar
"
Any idea ?
Ragini
catalina.sh run -security
Basically runs tomcat with the Security Manager.
I think the "talina.sh" command is missing the "ca" in front of it :-). If
not past
profiler I use.
which I actually need. So my questions are as follow:
1) what does the/"catalina.sh run -security/" or "sh talina.sh run -security"
command exactly do ?
2) what difference it makes when I start tomcat by runninf catalina.sh or
startup.sh ?
3) How should I actually start the tomcat to run the application with security
? and getting it profiles too ?*
I am new to tomcat and dont understand a lot the script files of it.
I would highly appreciate any help..
Thanks
Ragini
.
catalina.log file has some exceptions. Please find the same attached
herewith.
Pl note that I am able to run other war files.
Could anyone please tell what's going wrong while deploying
acegisample.war file ?
Thank you.
Ragini.
Aug 20, 2012 12:07:
Hi all,
I am looking for some web applications which run on tomcat. I need them
to do some experiments for my research. I would like to do some attacks,
try to do some malicious behavior etc. Absolutely with no intention to
harm people ! just for my research work.
Could some body please mail me
On 08/09/2012 08:43 PM, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Ragini,
On 8/9/12 5:51 AM, Ragini wrote:
what my profiler profiles:- It gives me xml file containing list
of methods in a proper sequence in which they were executed while
running the server.
*My
17 matches
Mail list logo