You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tika.apache.org by "Munish Arya (Jira)" <ji...@apache.org> on 2022/02/09 12:24:00 UTC
[jira] [Commented] (TIKA-3674) Tika Standard Parser 2.2.1, using older poi i.e. 4.1.2, When we can get tika with POI 5.0.0+
[ https://issues.apache.org/jira/browse/TIKA-3674?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17489505#comment-17489505 ]
Munish Arya commented on TIKA-3674:
-----------------------------------
Thanks for that man!! :)
But unfortunately i can't see it on maven repository
!image-2022-02-09-17-53-10-417.png!
> Tika Standard Parser 2.2.1, using older poi i.e. 4.1.2, When we can get tika with POI 5.0.0+
> --------------------------------------------------------------------------------------------
>
> Key: TIKA-3674
> URL: https://issues.apache.org/jira/browse/TIKA-3674
> Project: Tika
> Issue Type: Bug
> Reporter: Munish Arya
> Priority: Blocker
> Fix For: 2.3.0
>
> Attachments: image-2022-02-09-17-07-14-216.png, image-2022-02-09-17-53-10-417.png
>
>
> POI 4.1.12 has vulnerabilities as shown below. Kindly release newer Tika Standard parsers with higher POI i.e. 5.0.0 or higher.
>
> !image-2022-02-09-17-07-14-216.png!
--
This message was sent by Atlassian Jira
(v8.20.1#820001)