Hello you can change HTML of email templates as described here:
http://openmeetings.apache.org/EditTemplates.html
The only limitation: you need to create more generic template, I'm
afraid it would be impossible to create 3 URL as in your example
On Thu, Jul 13, 2017 at 11:54 PM,
To set up gmail smtp you should get params from here:
https://support.google.com/a/answer/176600?hl=en
I have used "Gmail SMTP server"
In OM "mail.smtp.starttls.enable" should be "1"
In case of "unable to find valid certification path to requested
target" you most probably need to update JRE (to
Sorry about that, I thought that highlighting the exceptions would help you go
through the whole code.
Here are the different tests performed in summary with their corresponding
exceptions:
Apparently tuning Avast Off or ON and Chrome’s “Less Secure apps” Off or On has
no effect, except with
Hello,
I have another request,
After setting a conference request, a mail with default message and
links in it is sent.
Here is the default message:
"If you have problems with the link, please copy and paste this to your
browser:
http://localhost:5080/openmeetings/#room/36;
In fact, I
Severity: Lowest
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetingsrespond to the following insecure HTTP
Methods: PUT, DELETE, HEAD, and PATCH.
CVE-2017-7685
The issue was fixed in 3.3.0
All users are recommended to upgrade to
Severity: Low
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings updates user password in insecure manner.
CVE-2017-7688
The issue was fixed in 3.3.0
All users are recommended to upgrade to Apache OpenMeetings 3.3.0
Credit:
Severity: Low
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings doesn't check contents of files being
uploaded. An attacker can cause a denial of service by uploading
multiple large files to the server
CVE-2017-7684
The issue
Severity: Lowest
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings displays Tomcat version and detailed
error stack trace which is not secure.
CVE-2017-7683
The issue was fixed in 3.3.0
All users are recommended to upgrade to
Severity: Medium
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 3.2.0
Description: Apache OpenMeetings is vulnerable to parameter
manipulation attacks, as a result attacker has access to restricted
areas.
CVE-2017-7682
The issue was fixed in 3.3.0
All users are
Severity: High
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings is vulnerable to SQL injection This
allows authenticated users to modify the structure of the existing
query and leak the structure of other queries being made by
Severity: Low
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings has an overly permissive
crossdomain.xml file. This allows for flash content to be loaded from
untrusted domains.
CVE-2017-7680
The issue was fixed in 3.3.0
All
Severity: High
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache OpenMeetings uses not very strong cryptographic
storage, captcha is not used in registration and forget password
dialogs and auth forms missing brute force protection
Severity: High
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 1.0.0
Description: Apache Openmeetings is vulnerable to Cross-Site Request
Forgery (CSRF) attacks, XSS attacks, click-jacking, and MIME based
attacks
CVE-2017-7666
The issue was fixed in 3.3.0
All
Severity: High
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 3.1.0
Description: Uploaded XML documents were not correctly validated
CVE-2017-7664
The issue was fixed in 3.3.0
All users are recommended to upgrade to Apache OpenMeetings 3.3.0
Credit: This issue
Severity: High
Vendor: The Apache Software Foundation
Versions Affected: Apache OpenMeetings 3.2.0
Description: Both global and Room chat are vulnerable to XSS attack
CVE-2017-7663
The issue was fixed in 3.3.0
All users are recommended to upgrade to Apache OpenMeetings 3.3.0
Credit: This
The Apache Openmeetings project is pleased to announce
the release of Apache Openmeetings 3.3.0.
The release is available for download from
http://openmeetings.apache.org/downloads.html
Apache OpenMeetings provides video conferencing, instant messaging, white board,
collaborative document editing
To be fair, I don't have enough time to read through 209 pages.
Could you please send email, find error in the log and paste it as text
into email?
Thanks in advance
On Thu, Jul 13, 2017 at 10:50 PM, Richard Pérez wrote:
> Here I send attached as PDFs Openmeetings
Please provide related part of openmeetings.log?
What the exact error are you receiving from java.mail?
On Thu, Jul 13, 2017 at 9:37 PM, Richard Pérez
wrote:
> Hello:
>
> I was "listening" in to this one because I'm suffering the same inability
> to send emails,
> I
Hello:
I was "listening" in to this one because I'm suffering the same inability to
send emails,
I get the same error messages.
I have tried with yahoo, Gmail, Hotmail and my website's email, with my
Antivirus disconnected or not, with Chrome's "less secure" active or not, with
465, 443, 587,
On 13.07.2017 02:58, Maxim Solodovnik wrote:
> Hello,
>
> This error "unable to find valid certification path to requested target"
> usually means certificate chin is not recognized to be secure
> I believe you need to import your CA certificate will all intermediate
> certificates to JRE
Please do not write direct emails.
Unfortunately I can give no estimates so far, not enough free time :(
On Thu, Jul 13, 2017 at 2:40 PM, Ganesh Singh wrote:
> Hi Maxim,
>
> Just wanted to know when can i expect the zoom feature for doc,pdf etc
> files in OM 4.0.0.
>
> If
21 matches
Mail list logo