You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tika.apache.org by "Munish Arya (Jira)" <ji...@apache.org> on 2022/02/09 12:24:00 UTC

[jira] [Commented] (TIKA-3674) Tika Standard Parser 2.2.1, using older poi i.e. 4.1.2, When we can get tika with POI 5.0.0+

    [ https://issues.apache.org/jira/browse/TIKA-3674?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17489505#comment-17489505 ] 

Munish Arya commented on TIKA-3674:
-----------------------------------

Thanks for that man!! :)

 

But unfortunately i can't see it on maven repository

 

!image-2022-02-09-17-53-10-417.png!

> Tika Standard Parser 2.2.1, using older poi i.e. 4.1.2, When we can get tika with POI 5.0.0+
> --------------------------------------------------------------------------------------------
>
>                 Key: TIKA-3674
>                 URL: https://issues.apache.org/jira/browse/TIKA-3674
>             Project: Tika
>          Issue Type: Bug
>            Reporter: Munish Arya
>            Priority: Blocker
>             Fix For: 2.3.0
>
>         Attachments: image-2022-02-09-17-07-14-216.png, image-2022-02-09-17-53-10-417.png
>
>
> POI 4.1.12 has vulnerabilities as shown below. Kindly release newer Tika Standard parsers with higher POI i.e. 5.0.0 or higher.
>  
> !image-2022-02-09-17-07-14-216.png!



--
This message was sent by Atlassian Jira
(v8.20.1#820001)