On 9/16/21 12:33 PM, ic...@apache.org wrote:
> This is an automated email from the ASF dual-hosted git repository.
> 
> icing pushed a commit to branch main
> in repository https://gitbox.apache.org/repos/asf/httpd-site.git
> 
> 
> The following commit(s) were added to refs/heads/main by this push:
>      new 51476c4  publishing release httpd-2.4.49
> 51476c4 is described below
> 
> commit 51476c4d2261ea5b68951054a50c08a249ea1306
> Author: Stefan Eissing <stefan.eiss...@greenbytes.de>
> AuthorDate: Thu Sep 16 09:58:23 2021 +0200
> 
>     publishing release httpd-2.4.49
> ---
>  content/doap.rdf    |  4 ++--
>  content/download.md | 24 ++++++++++++------------
>  content/index.md    |  6 +++---
>  3 files changed, 17 insertions(+), 17 deletions(-)

The vulnerabilties page is not updated yet. I guess this can be fixed by 
copying the respective json files
to https://github.com/apache/httpd-site/tree/main/content/security/json
Does https://cveprocess.apache.org/ provide any RESTFUL API to extract the JSON 
from the tool such that this can be scripted?

Regards

RĂ¼diger


Reply via email to