This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade org.apache.jmeter:ApacheJMeter_components from 5.5 to 5.6.1.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **2 versions** ahead of your current version.
- The recommended version was released **23 days ago**, on 2023-07-04.
The recommended version fixes:
Severity | Issue | PriorityScore (*) | Exploit Maturity |
:-------------------------:|:-------------------------|-------------------------|:-------------------------
| Denial of Service (DoS) [SNYK-JAVA-NETMINIDEV-3369748](https://snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept
| Remote Code Execution (RCE) [SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Cross-site Scripting (XSS) [SNYK-JAVA-ORGJSOUP-2989728](https://snyk.io/vuln/SNYK-JAVA-ORGJSOUP-2989728) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Arbitrary Code Execution [SNYK-JAVA-XALAN-2953385](https://snyk.io/vuln/SNYK-JAVA-XALAN-2953385) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept
| Arbitrary Code Execution [SNYK-JAVA-ORGAPACHECOMMONS-3043138](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-3043138) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept
| Server-side Request Forgery (SSRF) [SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Server-side Request Forgery (SSRF) [SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Server-side Request Forgery (SSRF) [SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept
| Denial of Service (DoS) [SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Denial of Service (DoS) [SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept
| Regular Expression Denial of Service (ReDoS) [SNYK-JAVA-ORGAPACHETIKA-2936441](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETIKA-2936441) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Information Exposure [SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
| Information Exposure [SNYK-JAVA-COMMONSNET-3153503](https://snyk.io/vuln/SNYK-JAVA-COMMONSNET-3153503) | **696/1000** **Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit
(*) Note that the real score may have changed since the PR was raised.
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.*
For more information:
🧐 [View latest project report](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b?utm_source=github&utm_medium=referral&page=upgrade-pr)
🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr)
🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?pkg=org.apache.jmeter:ApacheJMeter_components&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)
This PR was automatically created by Snyk using the credentials of a real user.
Snyk has created this PR to upgrade org.apache.jmeter:ApacheJMeter_components from 5.5 to 5.6.1.
:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.- The recommended version is **2 versions** ahead of your current version. - The recommended version was released **23 days ago**, on 2023-07-04. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Denial of Service (DoS)
[SNYK-JAVA-NETMINIDEV-3369748](https://snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Remote Code Execution (RCE)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Cross-site Scripting (XSS)
[SNYK-JAVA-ORGJSOUP-2989728](https://snyk.io/vuln/SNYK-JAVA-ORGJSOUP-2989728) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Arbitrary Code Execution
[SNYK-JAVA-XALAN-2953385](https://snyk.io/vuln/SNYK-JAVA-XALAN-2953385) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Arbitrary Code Execution
[SNYK-JAVA-ORGAPACHECOMMONS-3043138](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-3043138) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Denial of Service (DoS)
[SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Denial of Service (DoS)
[SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JAVA-ORGAPACHETIKA-2936441](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETIKA-2936441) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JAVA-COMMONSNET-3153503](https://snyk.io/vuln/SNYK-JAVA-COMMONSNET-3153503) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b?utm_source=github&utm_medium=referral&page=upgrade-pr) 🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr) 🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?pkg=org.apache.jmeter:ApacheJMeter_components&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)