dbptk-ui
dbptk-ui copied to clipboard
[Snyk] Fix for 9 vulnerabilities
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.
Changes included in this PR
- Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
- pom.xml
Vulnerabilities that will be fixed
With an upgrade:
Severity | Priority Score (*) | Issue | Upgrade | Breaking Change | Exploit Maturity | Reachability |
---|---|---|---|---|---|---|
![]() |
600/1000 Why? Proof of Concept exploit, Has a fix available, CVSS 7.5 |
XML External Entity (XXE) Injection SNYK-JAVA-DOM4J-174153 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
No | Proof of Concept | No Path Found |
![]() |
520/1000 Why? Has a fix available, CVSS 7.4 |
XML External Entity (XXE) Injection SNYK-JAVA-DOM4J-2812975 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
No | No Known Exploit | No Path Found |
![]() |
438/1000 Why? Has a fix available, CVSS 5.6 |
Improper Certificate Validation SNYK-JAVA-IONETTY-1042268 |
org.apache.solr:solr-core: 8.11.2 -> 9.0.0 org.apache.solr:solr-solrj: 8.11.2 -> 9.0.0 |
Yes | No Known Exploit | No Path Found |
![]() |
445/1000 Why? Has a fix available, CVSS 5.9 |
Regular Expression Denial of Service (ReDoS) SNYK-JAVA-ORGAPACHETIKA-2825265 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
Yes | No Known Exploit | No Path Found |
![]() |
415/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-JAVA-ORGAPACHETIKA-2859197 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
Yes | No Known Exploit | No Path Found |
![]() |
415/1000 Why? Has a fix available, CVSS 5.3 |
Regular Expression Denial of Service (ReDoS) SNYK-JAVA-ORGAPACHETIKA-2936441 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
Yes | No Known Exploit | No Path Found |
![]() |
390/1000 Why? Has a fix available, CVSS 4.8 |
Cryptographic Issues SNYK-JAVA-ORGBOUNCYCASTLE-31045 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
No | No Known Exploit | No Path Found |
![]() |
415/1000 Why? Has a fix available, CVSS 5.3 |
Cryptographic Issues SNYK-JAVA-ORGBOUNCYCASTLE-31046 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
No | No Known Exploit | No Path Found |
![]() |
640/1000 Why? Has a fix available, CVSS 9.8 |
Hash Collision SNYK-JAVA-ORGBOUNCYCASTLE-31657 |
org.apache.tika:tika-parsers: 1.4 -> 2.0.0 |
No | No Known Exploit | No Path Found |
(*) Note that the real score may have changed since the PR was raised.
Check the changes in this PR to ensure they won't cause issues with your project.
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📚 Read more about Snyk's upgrade and patch logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 XML External Entity (XXE) Injection 🦉 Regular Expression Denial of Service (ReDoS) 🦉 Cryptographic Issues