abstracta / jmeter-java-dsl

Simple JMeter performance tests API
https://abstracta.github.io/jmeter-java-dsl/
Apache License 2.0
477 stars 59 forks source link

[Snyk] Upgrade org.apache.jmeter:ApacheJMeter_http from 5.5 to 5.6.2 #216

Open rabelenda opened 1 year ago

rabelenda commented 1 year ago

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade org.apache.jmeter:ApacheJMeter_http from 5.5 to 5.6.2.

:information_source: Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.
- The recommended version is **3 versions** ahead of your current version. - The recommended version was released **a month ago**, on 2023-07-11. The recommended version fixes: Severity | Issue | PriorityScore (*) | Exploit Maturity | :-------------------------:|:-------------------------|-------------------------|:------------------------- | Denial of Service (DoS)
[SNYK-JAVA-NETMINIDEV-3369748](https://snyk.io/vuln/SNYK-JAVA-NETMINIDEV-3369748) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Remote Code Execution (RCE)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Cross-site Scripting (XSS)
[SNYK-JAVA-ORGJSOUP-2989728](https://snyk.io/vuln/SNYK-JAVA-ORGJSOUP-2989728) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Arbitrary Code Execution
[SNYK-JAVA-XALAN-2953385](https://snyk.io/vuln/SNYK-JAVA-XALAN-2953385) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Arbitrary Code Execution
[SNYK-JAVA-ORGAPACHECOMMONS-3043138](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECOMMONS-3043138) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Server-side Request Forgery (SSRF)
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Denial of Service (DoS)
[SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Denial of Service (DoS)
[SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897](https://snyk.io/vuln/SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | Proof of Concept | Regular Expression Denial of Service (ReDoS)
[SNYK-JAVA-ORGAPACHETIKA-2936441](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETIKA-2936441) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442](https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit | Information Exposure
[SNYK-JAVA-COMMONSNET-3153503](https://snyk.io/vuln/SNYK-JAVA-COMMONSNET-3153503) | **696/1000**
**Why?** Proof of Concept exploit, Has a fix available, CVSS 7.5 | No Known Exploit (*) Note that the real score may have changed since the PR was raised.
**Note:** *You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.* For more information: 🧐 [View latest project report](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b?utm_source=github&utm_medium=referral&page=upgrade-pr) 🛠 [Adjust upgrade PR settings](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?utm_source=github&utm_medium=referral&page=upgrade-pr) 🔕 [Ignore this dependency or unsubscribe from future upgrade PRs](https://app.snyk.io/org/rabelenda/project/f7cd9e22-f92e-4e76-ac1d-94a2c403497b/settings/integration?pkg=org.apache.jmeter:ApacheJMeter_http&utm_source=github&utm_medium=referral&page=upgrade-pr#auto-dep-upgrades)