Hi,
can you trigger an update of the pattern on
https://nvd.nist.gov/vuln/detail/CVE-2016-131 somehow? Currently OWASP
dependency check still considers 1.3.3 as insecure.
Cheers
Dennis
-
To unsubscribe, e-mail: dev-unsubsc
Thanks Rob!
Bruno
From: Rob Tompkins
To: Commons Developers List ; Bruno P. Kinoshita
Sent: Thursday, 15 June 2017 11:39 PM
Subject: Re: [ANNOUNCE] Apache Commons FileUpload 1.3.3 released.
> On Jun 15, 2017, at 6:08 AM, Bruno P. Kinoshita
>
creates the site from master branch, I fixed the issues, so
> the report will be - hopefully - empty
Fixed, and added site deployment from the build.
-Rob
>
> From: Rob Tompkins
> To: annou...@apache.org; Commons Developers List ;
> Commons Users L
Developers List ;
Commons Users List
Sent: Thursday, 15 June 2017 12:56 AM
Subject: [ANNOUNCE] Apache Commons FileUpload 1.3.3 released.
The Apache Commons Team is pleased to announce the release of Apache Commons
FileUpload 1.3.3.
The Apache Commons FileUpload library parses HTTP requests which
Then maybe we need to document the fact that our code is still based on the
old RFC (is it?) and that we welcome contributions to modernize to the new
RFC...
On Jun 14, 2017 7:07 AM, "Julian Reschke" wrote:
> ...
>
>> The Apache Commons FileUpload library parses HTTP requests which conform
>> to
...
The Apache Commons FileUpload library parses HTTP requests which conform to RFC
1867, "Form-based File Upload in HTML." That is, if an HTTP request is
submitted using the POST method, and with a content type of
"multipart/form-data," then FileUpload can parse that request, and make the
result
The Apache Commons Team is pleased to announce the release of Apache Commons
FileUpload 1.3.3.
The Apache Commons FileUpload library parses HTTP requests which conform to RFC
1867, "Form-based File Upload in HTML." That is, if an HTTP request is
submitted using the POST method, and with a content