IBM Java SE version 8 is vulnerable to arbitrary code execution due to the incorrect skeleton selection in RMI registry server-side, dispatching handling (RMI, 8218453) (CVE-2019-2684)
lists.opensuse.org/opensuse-security-announce/2019-05/msg00007.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
lists.opensuse.org/opensuse-security-announce/2019-06/msg00013.html
www.openwall.com/lists/oss-security/2020/09/01/4
www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
access.redhat.com/errata/RHBA-2019:0959
access.redhat.com/errata/RHSA-2019:1146
access.redhat.com/errata/RHSA-2019:1163
access.redhat.com/errata/RHSA-2019:1164
access.redhat.com/errata/RHSA-2019:1165
access.redhat.com/errata/RHSA-2019:1166
access.redhat.com/errata/RHSA-2019:1238
access.redhat.com/errata/RHSA-2019:1325
access.redhat.com/errata/RHSA-2019:1518
access.redhat.com/security/updates/classification/#important
lists.apache.org/thread.html/38a01302c92ae513910d8c851a2d111736565bd698be4e3af3e4c063@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/43530b91506e2e0c11cfbe691173f5df8c48f51b98262426d7493b67@%3Cannounce.tomcat.apache.org%3E
lists.apache.org/thread.html/71bd3e4e222479c266eaafc8d0c171ef5782a69b52f68df11b650ed7@%3Cusers.tomcat.apache.org%3E
lists.apache.org/thread.html/c58d6c3b49c615916b163809f963a55421cac2264885739508e68108@%3Cannounce.apache.org%3E
lists.apache.org/thread.html/f7f54b4888060d99f59993f006e25005a2b58db0c07ff866bdcd6f17@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r1fd117082b992e7d43c1286e966c285f98aa362e685695d999ff42f7@%3Cuser.cassandra.apache.org%3E
lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/r718e01f61b35409a4f7a3ccbc1cb5136a1558a9f9c2cb8d4ca9be1ce@%3Cuser.cassandra.apache.org%3E
lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rab8d90d28f944d84e4d7852f355a25c89451ae02c2decc4d355a9cfc@%3Cuser.cassandra.apache.org%3E
lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E
lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152@%3Cdev.cassandra.apache.org%3E
lists.apache.org/thread.html/rcd7544b24d8fc32b7950ec4c117052410b661babaa857fb1fc641152@%3Cuser.cassandra.apache.org%3E
lists.debian.org/debian-lts-announce/2019/05/msg00011.html
seclists.org/bugtraq/2019/May/75
security.gentoo.org/glsa/201908-10
support.f5.com/csp/article/K11175903?utm_source=f5support&utm_medium=RSS
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03959en_us
usn.ubuntu.com/3975-1/
www.debian.org/security/2019/dsa-4453