You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@poi.apache.org by fa...@apache.org on 2021/01/13 23:34:07 UTC

svn commit: r1885457 - /poi/site/publish/index.html

Author: fanningpj
Date: Wed Jan 13 23:34:06 2021
New Revision: 1885457

URL: http://svn.apache.org/viewvc?rev=1885457&view=rev
Log:
fix date in news

Modified:
    poi/site/publish/index.html

Modified: poi/site/publish/index.html
URL: http://svn.apache.org/viewvc/poi/site/publish/index.html?rev=1885457&r1=1885456&r2=1885457&view=diff
==============================================================================
--- poi/site/publish/index.html (original)
+++ poi/site/publish/index.html Wed Jan 13 23:34:06 2021
@@ -179,8 +179,8 @@ document.write("Last Published: " + docu
 <a name="Project+News"></a>
 <h2 class="boxed">Project News</h2>
 <div class="section">
-<a name="13+January+2020+-+CVE-2021-23926+-+XML+External+Entity+%28XXE%29+Processing+in+Apache+XMLBeans+versions+prior+to+3.0.0"></a>
-<h3 class="boxed">13 January 2020 - CVE-2021-23926 - XML External Entity (XXE) Processing in Apache XMLBeans versions prior to 3.0.0</h3>
+<a name="13+January+2021+-+CVE-2021-23926+-+XML+External+Entity+%28XXE%29+Processing+in+Apache+XMLBeans+versions+prior+to+3.0.0"></a>
+<h3 class="boxed">13 January 2021 - CVE-2021-23926 - XML External Entity (XXE) Processing in Apache XMLBeans versions prior to 3.0.0</h3>
 <p>Description:<br>
           When parsing XML files using XMLBeans 2.6.0 or below, the underlying parser
           created by XMLBeans could be susceptible to XML External Entity (XXE) attacks.</p>



---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscribe@poi.apache.org
For additional commands, e-mail: commits-help@poi.apache.org