dbptk-ui icon indicating copy to clipboard operation
dbptk-ui copied to clipboard

[Snyk] Fix for 9 vulnerabilities

Open luis100 opened this issue 1 year ago • 0 comments

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity Reachability
high severity 600/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
XML External Entity (XXE) Injection
SNYK-JAVA-DOM4J-174153
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
No Proof of Concept No Path Found
high severity 520/1000
Why? Has a fix available, CVSS 7.4
XML External Entity (XXE) Injection
SNYK-JAVA-DOM4J-2812975
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
No No Known Exploit No Path Found
medium severity 438/1000
Why? Has a fix available, CVSS 5.6
Improper Certificate Validation
SNYK-JAVA-IONETTY-1042268
org.apache.solr:solr-core:
8.11.2 -> 9.0.0
org.apache.solr:solr-solrj:
8.11.2 -> 9.0.0
Yes No Known Exploit No Path Found
medium severity 445/1000
Why? Has a fix available, CVSS 5.9
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2825265
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
Yes No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2859197
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
Yes No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2936441
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
Yes No Known Exploit No Path Found
medium severity 390/1000
Why? Has a fix available, CVSS 4.8
Cryptographic Issues
SNYK-JAVA-ORGBOUNCYCASTLE-31045
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
No No Known Exploit No Path Found
medium severity 415/1000
Why? Has a fix available, CVSS 5.3
Cryptographic Issues
SNYK-JAVA-ORGBOUNCYCASTLE-31046
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
No No Known Exploit No Path Found
critical severity 640/1000
Why? Has a fix available, CVSS 9.8
Hash Collision
SNYK-JAVA-ORGBOUNCYCASTLE-31657
org.apache.tika:tika-parsers:
1.4 -> 2.0.0
No No Known Exploit No Path Found

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 XML External Entity (XXE) Injection 🦉 Regular Expression Denial of Service (ReDoS) 🦉 Cryptographic Issues

luis100 avatar Oct 03 '23 06:10 luis100