> Am 16.09.2021 um 14:04 schrieb Ruediger Pluem <rpl...@apache.org>:
> 
> 
> 
> On 9/16/21 12:33 PM, ic...@apache.org wrote:
>> This is an automated email from the ASF dual-hosted git repository.
>> 
>> icing pushed a commit to branch main
>> in repository https://gitbox.apache.org/repos/asf/httpd-site.git
>> 
>> 
>> The following commit(s) were added to refs/heads/main by this push:
>>     new 51476c4  publishing release httpd-2.4.49
>> 51476c4 is described below
>> 
>> commit 51476c4d2261ea5b68951054a50c08a249ea1306
>> Author: Stefan Eissing <stefan.eiss...@greenbytes.de>
>> AuthorDate: Thu Sep 16 09:58:23 2021 +0200
>> 
>>    publishing release httpd-2.4.49
>> ---
>> content/doap.rdf    |  4 ++--
>> content/download.md | 24 ++++++++++++------------
>> content/index.md    |  6 +++---
>> 3 files changed, 17 insertions(+), 17 deletions(-)
> 
> The vulnerabilties page is not updated yet. I guess this can be fixed by 
> copying the respective json files
> to https://github.com/apache/httpd-site/tree/main/content/security/json
> Does https://cveprocess.apache.org/ provide any RESTFUL API to extract the 
> JSON from the tool such that this can be scripted?

With links such as these it looks unguessable

blob:https://cveprocess.apache.org/3c51c80b-1d31-403a-9d1d-95c928f91574

(involuntarily learning about 'blob:' url schemes...aaahhhhh!)

> 
> Regards
> 
> RĂ¼diger
> 
> 

Reply via email to