Dear Tomcat users,
I am trying to characterize the way vulnerabilities are corrected and I have
used the vulnerability reports of the Apache Tomcat in my research work.
Currently I am facing difficulties to find out how some of the reported
vulnerabilities were corrected, especially when there
On Thu, Mar 25, 2010 at 5:11 PM, Mark Thomas ma...@apache.org wrote:
On 25/03/2010 16:35, Naaliel Mendes wrote:
Dear Tomcat users,
I am trying to characterize the way vulnerabilities are corrected and I
have
used the vulnerability reports of the Apache Tomcat in my research work