How can I help? I'm happy to submit a patch if you like... This is a fairly 
critical security issue and I'm willing to get my hands dirty and help.... 
code? wash your car? free trips to Hawaii? What do need?

Aloha,
--
Jim Manico
@Manicode
(808) 652-3805

> On Mar 4, 2015, at 9:16 AM, Cantor, Scott <canto...@osu.edu> wrote:
> 
> On 3/4/15, 5:08 PM, "Jim Manico" <j...@manico.net> wrote:
> 
> 
> 
>> With respect, XXE is a massive vulnerability that is turned off by 
>> default in Java 8 as well as IBM parsers. Is there any proof or risk 
>> model I could provide to convince Xerces to turn this off by default?
> 
> +1
> 
> And it's not the only unfixed vulnerability in play (per the note I just 
> sent).
> 
> -- Scott
> 
> B‹KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKCB•È[œÝXœØÜšX™KK[XZ[ˆ‹]\Ù\œË][œÝXœØÜšX™P\˜Ù\˘\XÚK›Ü™ÃB‘›ÜˆY][Û˜[ÛÛ[X[™ËK[XZ[ˆ‹]\Ù\œËZ[\˜Ù\˘\XÚK›Ü™ÃB

---------------------------------------------------------------------
To unsubscribe, e-mail: j-users-unsubscr...@xerces.apache.org
For additional commands, e-mail: j-users-h...@xerces.apache.org

Reply via email to