Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk] Upgrade org.apache.jmeter:ApacheJMeter_java from 5.5 to 5.6.2 #220

Closed

Conversation

rabelenda
Copy link
Contributor

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to upgrade org.apache.jmeter:ApacheJMeter_java from 5.5 to 5.6.2.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 3 versions ahead of your current version.
  • The recommended version was released 2 months ago, on 2023-07-11.

The recommended version fixes:

Severity Issue PriorityScore (*) Exploit Maturity
Denial of Service (DoS)
SNYK-JAVA-NETMINIDEV-3369748
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Proof of Concept
Arbitrary Code Execution
SNYK-JAVA-ORGAPACHECOMMONS-3043138
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Proof of Concept
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031728
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031729
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Server-side Request Forgery (SSRF)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3031730
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Proof of Concept
Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3091180
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Denial of Service (DoS)
SNYK-JAVA-COMTHOUGHTWORKSXSTREAM-3182897
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Proof of Concept
Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHETIKA-2936441
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Information Exposure
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063442
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHEXMLGRAPHICS-3063691
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Cross-site Scripting (XSS)
SNYK-JAVA-ORGJSOUP-2989728
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Information Exposure
SNYK-JAVA-COMMONSNET-3153503
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
No Known Exploit
Arbitrary Code Execution
SNYK-JAVA-XALAN-2953385
696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Proof of Concept

(*) Note that the real score may have changed since the PR was raised.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

🧐 View latest project report

🛠 Adjust upgrade PR settings

🔕 Ignore this dependency or unsubscribe from future upgrade PRs

@rabelenda rabelenda closed this Sep 12, 2023
@rabelenda rabelenda deleted the snyk-upgrade-457b201aa57d0e03298a2821aa4e85a1 branch September 12, 2023 14:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants