rvesse commented on code in PR #157:
URL: https://github.com/apache/jena-site/pull/157#discussion_r1177684511


##########
source/about_jena/security-advisories.md:
##########
@@ -50,9 +50,23 @@ policy above we advise users to always utilise the latest 
Jena release available
 
 Please refer to the individual CVE links for further details and mitigations.
 
+## CVE-2023-22665 - Exposure of arbitrary execution in script engine 
expressions.
+
+[CVE-2023](https://www.cve.org/CVERecord?id=CVE-2023-22665) affects Jena ?? 
through 4.7.0 and relates to the [Javascript

Review Comment:
   Feature was introduced in Jena 3.7.0



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@jena.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to