Hi Srujith,

On Fri, Apr 7, 2023 at 1:04 PM SRUJITH PULIPAKA <[email protected]> wrote:

> Can you tell me what is the change made for it to remove the vulnerability?

XalanJ uses Apache BCEL, to implement its XSLTC processor (that helps
to translate, XSLT stylesheets into Java byte code). To fix this
vulnerability, that you're referring to, a new version of Apache BCEL
was released (v 6.7.0) and packaged into XalanJ 2.7.3.


-- 
Regards,
Mukul Gandhi

Reply via email to