Medium Severity

Security Bulletin: October 2020 Patch Update for Java

Share this post:

The October 2020 update to Java contains fixes for a number of potential vulnerabilities. Refer to the Details section for additional information.

CVE(s): CVE-2020-14779 , CVE-2020-14792 , CVE-2020-14796 , CVE-2020-14797 , CVE-2020-14798

Affected product(s) and affected version(s):

Affected Product(s) Version(s)
WA for CP4D 1.4.2, 1.5.0

Refer to the following reference URLs for remediation and additional vulnerability details:  
Source Bulletin: https://www.ibm.com/support/pages/node/6475853
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/190097
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/190110
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/190114
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/190115
X-Force Database: https://exchange.xforce.ibmcloud.com/vulnerabilities/190116

More stories

Security Bulletin: PostgreSQL Vulnerability Affects IBM Sterling Connect:Direct for Microsoft Windows (CVE-2021-32029)

Sep 27, 2021 8:00 pm EDT | Medium Severity

There is a vulnerability in PostgreSQL 11 and 12 used by IBM Sterling Connect:Direct for Microsoft Windows. IBM Sterling Connect:Direct for Microsoft Windows has addressed the applicable CVE. ...read more


Security Bulletin: Multiple vulnerabilities in Apache HTTP Server affect IBM i

Sep 24, 2021 8:00 pm EDT | Medium Severity

Apache HTTP Server on IBM i is vulnerabile to the issues described in the vulnerability details section. IBM i has addressed the vulnerabilities in the Apache HTTP Server implementation as described in the remediation/fixes section. ...read more


Security Bulletin: Rational Asset Analyzer is affected by a WebSphere Application Server vulnerability.

Sep 23, 2021 8:00 pm EDT | Medium Severity

WebSphere Application Server Liberty used by Rational Asset Analyzer is vulnerable to an XML External Entity Injection (XXE) vulnerability. This has been addressed. ...read more