Link | Resource |
---|---|
https://spark.apache.org/security.html#CVE-2020-9480 | Vendor Advisory |
https://lists.apache.org/thread.html/ree9e87aae81852330290a478692e36ea6db47a52a694545c7d66e3e2@%3Cdev.spark.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/rb3956440747e41940d552d377d50b144b60085e7ff727adb0e575d8d@%3Ccommits.submarine.apache.org%3E | Exploit Mailing List |
https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a27eaada75222761efc3f7238b5a3b@%3Ccommits.doris.apache.org%3E | Mailing List Vendor Advisory |
https://www.oracle.com/security-alerts/cpuApr2021.html | Patch Third Party Advisory |
Configuration 1
|
Published : 2020-06-23 10:15
Updated : 2022-04-26 05:06
NVD link : CVE-2020-9480
Mitre link : CVE-2020-9480