DataDefender
                                
                                
                                
                                    DataDefender copied to clipboard
                            
                            
                            
                        [Snyk] Security upgrade org.apache.tika:tika-parsers from 1.25 to 2.0.0
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- pom.xml
 
 
Vulnerabilities that will be fixed
With an upgrade:
| Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity | 
|---|---|---|---|---|---|
| 661/1000   Why? Recently disclosed, Has a fix available, CVSS 7.5  | 
Denial of Service (DoS)  SNYK-JAVA-COMGOOGLEPROTOBUF-3167772  | 
org.apache.tika:tika-parsers: 1.25 -> 2.0.0  | 
Yes | No Known Exploit | |
| 551/1000   Why? Recently disclosed, Has a fix available, CVSS 5.3  | 
Information Exposure  SNYK-JAVA-ORGAPACHECXF-3168313  | 
org.apache.tika:tika-parsers: 1.25 -> 2.0.0  | 
Yes | No Known Exploit | |
| 808/1000   Why? Proof of Concept exploit, Recently disclosed, Has a fix available, CVSS 8.3  | 
Server-side Request Forgery (SSRF)  SNYK-JAVA-ORGAPACHECXF-3168315  | 
org.apache.tika:tika-parsers: 1.25 -> 2.0.0  | 
Yes | Proof of Concept | 
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:  
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Denial of Service (DoS) 🦉 Server-side Request Forgery (SSRF)