Fluid Attacks identifies the vulnerable dependencies you use and informs you what versions to upgrade to.
Follow these steps:
Enter the group where the vulnerability is located and click on the weakness name.
From the table, click on the third-party software vulnerability of your interest.
Switch to the How to fix tab in the pop-up window.
Read the information on what version to upgrade to.
When you have upgraded your dependencies to their safe versions, run a reattack.