You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@poi.apache.org by fa...@apache.org on 2022/03/04 11:23:59 UTC
svn commit: r1898597 - /poi/site/publish/index.html
Author: fanningpj
Date: Fri Mar 4 11:23:59 2022
New Revision: 1898597
URL: http://svn.apache.org/viewvc?rev=1898597&view=rev
Log:
cve
Modified:
poi/site/publish/index.html
Modified: poi/site/publish/index.html
URL: http://svn.apache.org/viewvc/poi/site/publish/index.html?rev=1898597&r1=1898596&r2=1898597&view=diff
==============================================================================
--- poi/site/publish/index.html (original)
+++ poi/site/publish/index.html Fri Mar 4 11:23:59 2022
@@ -188,10 +188,6 @@ document.write("Last Published: " + docu
<p>Mitigation:<br>
Affected users are advised to update to poi-scratchpad 5.2.1 or above
which fixes this vulnerability. It is recommended that you use the same versions of all POI jars.</p>
-<p>References:
- <a href="https://en.wikipedia.org/wiki/XML_external_entity_attack">XML external entity attack</a>
-
-</p>
<a name="3+March+2022+-+POI+5.2.1+available"></a>
<h3 class="boxed">3 March 2022 - POI 5.2.1 available</h3>
<p>The Apache POI team is pleased to announce the release of 5.2.1.
---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@poi.apache.org
For additional commands, e-mail: commits-help@poi.apache.org