A few days ago curious, also just got a bit of free, and then want to see VIEWVC to Subversion support degree, so want to pretend to play. Good to die, on my VMware workstation just have a Windows Server 2003, I thought, it, but so a lazy, toss me for a few days, eventually can only be counted on it to put on.
Installation environment: Windows Server 2003, IIS 6, suberversion 1.3.0, VIEWVC 1.0-dev
Installat
Test Linux: Ubuntu8.04 I think you have installed Subversion and Apache here. For details, see subversionapache installation configuration. Http://www.linuxidc.com/linux/2012-04/59317.htmviewvcinstall the environment of 1.viewvc.pdf forcvssupport:n
Test Linux: Ubuntu 8.04
Here I think you have installed Subversion and Apache. For more information, see subversion apache installation configuration. Http://www.linuxidc.com/Linux/2012-04/59317.htm
Install ViewVC
Note: svn based on the Linux platform has the diff function, but the diff function on the Character interface is too readable, so I 'd like to upgrade the diff function to build bugfreeforsvn, we recommend that you use ViewVC. This software should be a good choice. OK. You don't have to think so much. let's go ......
How?
1. because it needs to be integrated with svn, the previously established SVN needs to be re-compiled and installed.
2.
Release date:Updated on:
Affected Systems:ViewVC 1.1.xViewVC 1.0.xUnaffected system:ViewVC 1.1.11Description:--------------------------------------------------------------------------------Bugtraq id: 47928Cve id: CVE-2009-5024
ViewVC is a Web-based CVS and SVN code repository browsing tool.
ViewVC "cvsdb. py" has a remote denial of service vulnerability. Remote attackers can exploit this vulnerability t
Release date:Updated on:
Affected Systems:RedHat Fedora 16Description:--------------------------------------------------------------------------------Bugtraq id: 54197Cve id: CVE-2012-3356
Viewvc is a web-based CVS and SVN code repository browsing tool.
ViewVC has a security vulnerability. Attackers can exploit this vulnerability to bypass certain security restrictions and perform illegal operations.
*>
Steps for the setup local SVN server:
1. Add "Subversion" group and add user account to this group;
2. Create SVN repository directory;
$ sudo mkdir/home/svn$ cd/home/svn$ sudo mkdir myproject$ sudo chown-r root:subversion myproject3. Create SVN repository;
$ sudo svnadmin create/home/svn/myproject4. Give group members the appropriate permissions for all files newly added to the file warehouse:
$ sudo chmod-r g+rws myprojectIf the above command runs before the SVN file warehouse is created,
see no, there are multiple options. There are four SVN packages. Let's talk about them here, SVN itself is a program with no interface, which is difficult to use. These versions are packaged, some contain Web servers, and some have graphical interfaces, in short, it makes it easier to use visual SVN. Many people like visual SVN. It seems that the graphic interface is quite friendly, but it may need to be cracked. I have chosen collabnet SVN and nnd for a great deal of effort to understand the r
Websvn client (transfer)-initos logs-Netease blog
Websvn client ()
2010-11-24 21:49:29| Category:Java| Tag:SVN Chinese directory supports viewvc |Font SizeLargeMediumSmallSubscription
In In the previous article, I complained about the inconvenience caused by viewvc for subversion installation. In the evening, I went to the Subversion website and saw the ghost Web Client and sventon, I thought
Release date:Updated on:
Affected Systems:Apache Group APR-util 1.3.xUnaffected system:Apache Group APR-util 1.3.10Description:--------------------------------------------------------------------------------Bugtraq id: 43673Cve id: CVE-2010-1623
Apr-util is the Apache tool library used by Apache to transplant runtime.
The apr_brigade_split_line function in the buckets/apr_brigade.c file of APR-util does not properly process user requests. Remote attackers can use this function to cause high m
CVE-2011-2204Apache Tomcat Information LeakageSecurity level: lowAffected Versions:-Tomcat 7.0.0 to 7.0.16-Tomcat 6.0.0 to 6.0.32-Tomcat 5.5.0 to 5.5.33
Earlier versions may also be affected.Vulnerability description:
When you use MemoryUserDatabase (tomcat-users.xml-based) and create a user through JMX, if an exception occurs, the error message on the JMX client will contain the user's password, this error message is also written to the Tomcat log file.
Steps to reproduce this vulnerability:
Apache cxf saml SubjectConfirmation Security Restriction Bypass Vulnerability
Release date:Updated on:
Affected Systems:Apache Group CXF Apache Group CXF Description:Bugtraq id: 70736CVE (CAN) ID: CVE-2014-3623
Apache CXF is an open-source service framework used to compile and develop services using front-end programming APIs such as JAX-WS and JAX-RS.
When Apache CXF versions earlier than 2.7.13 and Apache CXF versions earlier than 3.0.2 are used together with TransportBinding, The SAML Subject
.
Encryption
Use optional SSL
None
SSH channel
Logging
Completely record Apache logs for each HTTP request, and record common client operations with the option "advanced.
No logging
No logging
Interactivity
It can be partially used by other WebDAV clients.
Communicate with svn clients only
Communicate with svn clients only
Web browsing capability
Limited built-in support, or third-party tools such as
created
Wocould you like to create another user account? [Yes] no (no need to create another user now)
Wocould you like to configure ViewVC? [Yes] (whether to enable VierVC, press Enter)
Stopping CollabNet Subversion: httpd (no pid file) not running
Done
Starting CollabNet Subversion: done
(At this time,+The service is successfully configured. The last prompt is as follows :)
Congratulations! You have successfully configured the CollabNet
Subversion
Release date:Updated on:
Affected Systems:Sourceforge mod-security 2.xDescription:--------------------------------------------------------------------------------ModSecurity for Apache is a plug-in for the Apache Web server platform.
A security vulnerability exists in versions earlier than ModSecurity 2.70. when parsing multiple requests, malicious users can bypass certain filter rules.
Link: http://secunia.com/advisories/49853/Http://archives.neohapsis.com/archives/fulldisclosure/2012-10/011
:--------------------------------------------------------------------------------Vendor patch:Apache Group------------The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:Http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c? R1 = 1491564 r2 = 1523235 diff_format = hHttp://httpd.apache.org/security/vulnerabilities_24.htmlHttp://svn.apache.org/
The beta version of php5.4 is coming soon. Many new features of php5.4 are available on the Internet. Here is an official list for reference. php. netviewvcphpphp-src .... For me, apart from fixing some bugs, it is most worth looking forward... the beta version of php 5.4 is coming soon. Many new features of php 5.4 are available on the Internet. Here is an official list for reference: http://svn.php.net/viewvc/php/php-src .... For me, apart from fixi
browsing the code history, I also found a very interesting phenomenon. In March 4, 2008, someone accidentally deleted the entire ACE source code tree:
Https://svn.dre.vanderbilt.edu/viewvc/Middleware? View = revision revision = 80824
Then the recovery was very fast:
Https://svn.dre.vanderbilt.edu/viewvc/Middleware? View = revision revision = 80826
The guy who is doing this is 2005 ~ 2009 in the past few
Release date:Updated on:
Affected Systems:Apache Group solrDescription:--------------------------------------------------------------------------------Bugtraq id: 64427CVE (CAN) ID: CVE-2012-6612
Solr is a Lucene-based search server available for enterprises.
UpdateRequestHandler for XSLT or XPathEntityProcessor in Apache Solr 4.1 or earlier versions allows remote attackers to execute malicious attacks by using XML data and Object Reference containing external entity declarations to obtain sensi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.