rvesse commented on code in PR #157: URL: https://github.com/apache/jena-site/pull/157#discussion_r1177674985
########## source/about_jena/security-advisories.md: ########## @@ -50,9 +50,23 @@ policy above we advise users to always utilise the latest Jena release available Please refer to the individual CVE links for further details and mitigations. +## CVE-2023-22665 - Exposure of arbitrary execution in script engine expressions. + +[CVE-2023](https://www.cve.org/CVERecord?id=CVE-2023-22665) affects Jena ?? through 4.7.0 and relates to the [Javascript Review Comment: - [x] Need to go back through release notes to see when this feature was introduced -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: dev-unsubscr...@jena.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org