Author: fanningpj
Date: Fri Mar  4 11:18:25 2022
New Revision: 1898596

URL: http://svn.apache.org/viewvc?rev=1898596&view=rev
Log:
cve

Modified:
    poi/site/src/documentation/content/xdocs/index.xml

Modified: poi/site/src/documentation/content/xdocs/index.xml
URL: 
http://svn.apache.org/viewvc/poi/site/src/documentation/content/xdocs/index.xml?rev=1898596&r1=1898595&r2=1898596&view=diff
==============================================================================
--- poi/site/src/documentation/content/xdocs/index.xml (original)
+++ poi/site/src/documentation/content/xdocs/index.xml Fri Mar  4 11:18:25 2022
@@ -36,10 +36,7 @@
         <p>Mitigation:<br/>
           Affected users are advised to update to poi-scratchpad 5.2.1 or above
           which fixes this vulnerability. It is recommended that you use the 
same versions of all POI jars.</p>
-
-        <p>References:
-          <a 
href="https://en.wikipedia.org/wiki/XML_external_entity_attack";>XML external 
entity attack</a>
-        </p>
+        
       </section>
 
       <!-- latest final release -->



---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to