Hi Srujith, On Fri, Apr 7, 2023 at 1:04 PM SRUJITH PULIPAKA <[email protected]> wrote:
> Can you tell me what is the change made for it to remove the vulnerability? XalanJ uses Apache BCEL, to implement its XSLTC processor (that helps to translate, XSLT stylesheets into Java byte code). To fix this vulnerability, that you're referring to, a new version of Apache BCEL was released (v 6.7.0) and packaged into XalanJ 2.7.3. -- Regards, Mukul Gandhi
