GitHub - markquinn12/springBoot-JHipster-AJP-Port: Example of how to open an AJP port in a spring boot (tomcat) angular webapp
![CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (CNVD-2020-10487) - Blog | Tenable® CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (CNVD-2020-10487) - Blog | Tenable®](https://www.tenable.com/sites/drupal.dmz.tenablesecurity.com/files/images/blog/ajp-connect-requiredSecret.png)
CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (CNVD-2020-10487) - Blog | Tenable®
![What Is CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability | Markvision Enterprise What Is CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability | Markvision Enterprise](https://publications.lexmark.com/media/library/LEXMARK/Software%20and%20Networking2/FA1306/FA1306_IMG1.png)
What Is CVE-2020-1938: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability | Markvision Enterprise
![Basic Tomcat security configuration recommendations - Documentation for Product Quality and Security Group - BMC Documentation Basic Tomcat security configuration recommendations - Documentation for Product Quality and Security Group - BMC Documentation](https://docs.bmc.com/docs/security/files/924057229/934023297/1/1589370242358/image2020-5-13_7-44-2.png)