Bharath Mohanraj

Results 13 comments of Bharath Mohanraj

@zcool321 Can you please let me know if you had a chance to review this pull request https://github.com/jflyfox/jfinal_cms/pull/47 ? Thanks.

@zcool321 Hi George, Hope you are doing good. Could you please review the pull request #47 that I raised few weeks back, to fix a recently reported vulnerability (CVE-2022-33113, refer...

> Is anyone following up? @Paradox98 I was trying to reachout via Apache dev community to get this PR reviewed, but my subscription request to dev-community is still pending. So,...

@garydgregory @markt-asf @jvz @kinow @Paradox98 Dear Apache JXPath Maintainers, I'm requesting your review for this PR #25 which will fix the recent reported vulnerability CVE-2022-41852. I have also raised a...

> It looks like your commit didn't pass ci review. ![image](https://user-images.githubusercontent.com/61773822/196381496-394e0ff9-eee1-4e18-9cc9-7df8cb5631c2.png) @Paradox98 Yes, the ci review failed here, since JAVA_HOME variable is not defined in the machine. But, this error...

> That @0roman I'm sorry to say that I still don't agree to your statement... In the PR #26 you are changing the default behavior of jxpath... I would request...

[kyakdan](https://github.com/kyakdan) I'm still not convinced, Please help me understand one thing. Let's say I'm a JXPath user, and I'm not affected this vulnerability. JXPath is working all fine in my...

Hi Petr Penzin (@ppenzin ) I hope this message finds you well. I have submitted this pull request ([https://github.com/chakra-core/ChakraCore/pull/6996](https://github.com/chakra-core/ChakraCore/pull/6996)) for ChakraCore that addresses the vulnerability: "CVE-2021-42279 - Chakra Scripting Engine...

Thank you very much for your thoughts, Petr Penzin (@ppenzin). Below are my comments, please correct me if I'm wrong anywhere. (apologies for this lengthier comment, but I want to...