[ 
https://issues.apache.org/jira/browse/JXPATH-200?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Nicolò Mendola updated JXPATH-200:
----------------------------------
    Description: 
There is a CVE detected in jxpath 1.3. and prior. Could you take a look?

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe 
Reflection')

[https://avd.aquasec.com/nvd/2022/cve-2022-41852/]

Best Regards

  was:
There is a CVE detected in jxpath 1.3. Could you take a look?

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe 
Reflection')

[https://avd.aquasec.com/nvd/2022/cve-2022-41852/]

Best Regards


> CVE-2022-41852 Use of Externally-Controlled Input to Select Classes or Code 
> ('Unsafe Reflection')
> -------------------------------------------------------------------------------------------------
>
>                 Key: JXPATH-200
>                 URL: https://issues.apache.org/jira/browse/JXPATH-200
>             Project: Commons JXPath
>          Issue Type: Bug
>    Affects Versions: 1.3
>            Reporter: Nicolò Mendola
>            Priority: Blocker
>             Fix For: 1.4
>
>
> There is a CVE detected in jxpath 1.3. and prior. Could you take a look?
> Use of Externally-Controlled Input to Select Classes or Code ('Unsafe 
> Reflection')
> [https://avd.aquasec.com/nvd/2022/cve-2022-41852/]
> Best Regards



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to