Chris,
-Original Message-
From: Christopher Schultz [mailto:ch...@christopherschultz.net]
Sent: 23 November 2016 04:37
To: Tomcat Users List
Subject: Re: HTTP response status line doesn't have reason phrase.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chandra,
On 11/21/16 11:06 PM,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
William,
On 11/16/16 1:06 PM, William Boyd wrote:
> On Tue, Nov 15, 2016 at 2:17 PM,
> wrote:
>>
>> I haven't been following this super closely, but it sounds like
>> there is a lot of trial and error going on so let me try to
>> explain how the k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
To whom it may concern,
On 11/17/16 12:39 PM, Growingob2 wrote:
>
> I can't get my multi-level context path to deploy correctly. In
> Tomcat 5.5.26 foo#bar.war placed in my webapps directory deploys to
> /foo/bar. This is how I think is should work
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
On 11/22/16 5:51 AM, André Warnier (tomcat) wrote:
> So now, considering that such a thing would seem to have overall
> an overwhelming positive effect and no negative effect that we can
> think of, how would one go about proposing it ? For o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Chandra,
On 11/21/16 11:06 PM, Chandrashekar H.S wrote:
> Hi All,
>
> We have a multiple tomcat servers which are monitored by F5 health
> manager, all tomcat web servers contain a httpstatuscheck web
> service.
>
> The F5 does the heath ping and
On 21.11.2016 18:09, Christopher Schultz wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
André,
:)
On 11/19/16 12:31 PM, André Warnier (tomcat) wrote:
With respect, this is not only "André's problem".
Agreed. I apologize if it seemed like I was suggesting that you are
the only one c
CVE-2016-6817 Apache Tomcat Information Disclosure
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
Apache Tomcat 9.0.0.M1 to 9.0.0.M11
Apache Tomcat 8.5.0 to 8.5.6
Earlier versions are not affected.
Description
The HTTP/2 header parser entered an infinite loop if a
CVE-2016-8735 Apache Tomcat Remote Code Execution
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
Apache Tomcat 9.0.0.M1 to 9.0.0.M11
Apache Tomcat 8.5.0 to 8.5.6
Apache Tomcat 8.0.0.RC1 to 8.0.38
Apache Tomcat 7.0.0 to 7.0.72
Apache Tomcat 6.0.0 to 6.0.47
Earlier,
CVE-2016-6816 Apache Tomcat Information Disclosure
Severity: Important
Vendor: The Apache Software Foundation
Versions Affected:
Apache Tomcat 9.0.0.M1 to 9.0.0.M11
Apache Tomcat 8.5.0 to 8.5.6
Apache Tomcat 8.0.0.RC1 to 8.0.38
Apache Tomcat 7.0.0 to 7.0.72
Apache Tomcat 6.0.0 to 6.0.47
Earlier,