[ https://issues.apache.org/jira/browse/JXPATH-200?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Gary D. Gregory updated JXPATH-200: ----------------------------------- Fix Version/s: 1.4.1 (was: 1.4.0) > CVE-2022-41852 Use of Externally-Controlled Input to Select Classes or Code > ('Unsafe Reflection') > ------------------------------------------------------------------------------------------------- > > Key: JXPATH-200 > URL: https://issues.apache.org/jira/browse/JXPATH-200 > Project: Commons JXPath > Issue Type: Bug > Affects Versions: 1.3 > Reporter: Nicolò Mendola > Priority: Blocker > Fix For: 1.4.1 > > > There is a CVE detected in jxpath 1.3. and prior. Could you take a look? > Use of Externally-Controlled Input to Select Classes or Code ('Unsafe > Reflection') > [https://avd.aquasec.com/nvd/2022/cve-2022-41852/] > Best Regards -- This message was sent by Atlassian Jira (v8.20.10#820010)