You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@poi.apache.org by fa...@apache.org on 2022/03/04 11:23:59 UTC

svn commit: r1898597 - /poi/site/publish/index.html

Author: fanningpj
Date: Fri Mar  4 11:23:59 2022
New Revision: 1898597

URL: http://svn.apache.org/viewvc?rev=1898597&view=rev
Log:
cve

Modified:
    poi/site/publish/index.html

Modified: poi/site/publish/index.html
URL: http://svn.apache.org/viewvc/poi/site/publish/index.html?rev=1898597&r1=1898596&r2=1898597&view=diff
==============================================================================
--- poi/site/publish/index.html (original)
+++ poi/site/publish/index.html Fri Mar  4 11:23:59 2022
@@ -188,10 +188,6 @@ document.write("Last Published: " + docu
 <p>Mitigation:<br>
           Affected users are advised to update to poi-scratchpad 5.2.1 or above
           which fixes this vulnerability. It is recommended that you use the same versions of all POI jars.</p>
-<p>References:
-          <a href="https://en.wikipedia.org/wiki/XML_external_entity_attack">XML external entity attack</a>
-        
-</p>
 <a name="3+March+2022+-+POI+5.2.1+available"></a>
 <h3 class="boxed">3 March 2022 - POI 5.2.1 available</h3>
 <p>The Apache POI team is pleased to announce the release of 5.2.1.



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@poi.apache.org
For additional commands, e-mail: commits-help@poi.apache.org