This PR was automatically created by Snyk using the credentials of a real user.
![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123)
### Snyk has created this PR to fix 4 vulnerabilities in the maven dependencies of this project.
#### Snyk changed the following file(s):
- `pom.xml`
#### Vulnerabilities that will be fixed with an upgrade:
| | Issue | Score | Upgrade
:-------------------------:|:-------------------------|:-------------------------|:-------------------------
![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS) [SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424) | **146** | com.amazonaws:aws-java-sdk-s3: `1.12.211` -> `1.12.764` `Proof of Concept`
![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS) [SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426) | **146** | com.amazonaws:aws-java-sdk-s3: `1.12.211` -> `1.12.764` `Proof of Concept`
![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Denial of Service (DoS) [SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244) | **114** | com.amazonaws:aws-java-sdk-s3: `1.12.211` -> `1.12.764` `No Known Exploit`
![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS) [SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698) | **101** | com.amazonaws:aws-java-sdk-s3: `1.12.211` -> `1.12.764` `No Known Exploit`
---
> [!IMPORTANT]
>
> - Check the changes in this PR to ensure they won't cause issues with your project.
> - Max score is 1000. Note that the real score may have changed since the PR was raised.
> - This PR was automatically created by Snyk using the credentials of a real user.
---
**Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._
For more information:
π§ [View latest project report](https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr)
π [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates)
π [Adjust project settings](https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr/settings)
π [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities)
---
**Learn how to fix vulnerabilities with free interactive lessons:**
π¦ [Denial of Service (DoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr)
[//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"com.amazonaws:aws-java-sdk-s3","from":"1.12.211","to":"1.12.764"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","priority_score":101,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00105},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Dec 26 2021 15:34:31 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":1.67},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","priority_score":114,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00218},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Fri Mar 11 2022 14:24:04 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"high"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":1.9},{"name":"scoreVersion","value":"V5"}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","priority_score":146,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00264},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Oct 02 2022 10:05:31 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.43},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426","priority_score":146,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00252},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Oct 02 2022 09:54:05 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.42},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"}],"prId":"6440ea34-19fa-4e35-918f-567fc6106bd4","prPublicId":"6440ea34-19fa-4e35-918f-567fc6106bd4","packageManager":"maven","priorityScoreList":[101,114,146,146],"projectPublicId":"863565ea-8720-48d4-8818-7e58bbb8026d","projectUrl":"https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426"],"vulns":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'
This PR was automatically created by Snyk using the credentials of a real user.
![snyk-top-banner](https://github.com/andygongea/OWASP-Benchmark/assets/818805/c518c423-16fe-447e-b67f-ad5a49b5d123) ### Snyk has created this PR to fix 4 vulnerabilities in the maven dependencies of this project. #### Snyk changed the following file(s): - `pom.xml` #### Vulnerabilities that will be fixed with an upgrade: | | Issue | Score | Upgrade :-------------------------:|:-------------------------|:-------------------------|:------------------------- ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS)
[SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424) | **146** | com.amazonaws:aws-java-sdk-s3:
`1.12.211` -> `1.12.764`
`Proof of Concept` ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS)
[SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426) | **146** | com.amazonaws:aws-java-sdk-s3:
`1.12.211` -> `1.12.764`
`Proof of Concept` ![high severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/h.png 'high severity') | Denial of Service (DoS)
[SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244) | **114** | com.amazonaws:aws-java-sdk-s3:
`1.12.211` -> `1.12.764`
`No Known Exploit` ![medium severity](https://res.cloudinary.com/snyk/image/upload/w_20,h_20/v1561977819/icon/m.png 'medium severity') | Denial of Service (DoS)
[SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698](https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698) | **101** | com.amazonaws:aws-java-sdk-s3:
`1.12.211` -> `1.12.764`
`No Known Exploit` --- > [!IMPORTANT] > > - Check the changes in this PR to ensure they won't cause issues with your project. > - Max score is 1000. Note that the real score may have changed since the PR was raised. > - This PR was automatically created by Snyk using the credentials of a real user. --- **Note:** _You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs._ For more information: π§ [View latest project report](https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr) π [Customise PR templates](https://docs.snyk.io/scan-using-snyk/pull-requests/snyk-fix-pull-or-merge-requests/customize-pr-templates) π [Adjust project settings](https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr/settings) π [Read about Snyk's upgrade logic](https://support.snyk.io/hc/en-us/articles/360003891078-Snyk-patches-to-fix-vulnerabilities) --- **Learn how to fix vulnerabilities with free interactive lessons:** π¦ [Denial of Service (DoS)](https://learn.snyk.io/lesson/redos/?loc=fix-pr) [//]: # 'snyk:metadata:{"customTemplate":{"variablesUsed":[],"fieldsUsed":[]},"dependencies":[{"name":"com.amazonaws:aws-java-sdk-s3","from":"1.12.211","to":"1.12.764"}],"env":"prod","issuesToFix":[{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","priority_score":101,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00105},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Dec 26 2021 15:34:31 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":1.67},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"No Known Exploit","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","priority_score":114,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"low"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00218},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Fri Mar 11 2022 14:24:04 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"high"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":1.9},{"name":"scoreVersion","value":"V5"}],"severity":"high","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","priority_score":146,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00264},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Oct 02 2022 10:05:31 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.43},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"},{"exploit_maturity":"Proof of Concept","id":"SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426","priority_score":146,"priority_score_factors":[{"name":"confidentiality","value":"none"},{"name":"integrity","value":"none"},{"name":"availability","value":"high"},{"name":"scope","value":"unchanged"},{"name":"exploitCodeMaturity","value":"proofOfConcept"},{"name":"userInteraction","value":"none"},{"name":"privilegesRequired","value":"none"},{"name":"attackComplexity","value":"high"},{"name":"attackVector","value":"network"},{"name":"epss","value":0.00252},{"name":"isTrending","value":false},{"name":"publicationDate","value":"Sun Oct 02 2022 09:54:05 GMT+0000 (Coordinated Universal Time)"},{"name":"isReachable","value":false},{"name":"isTransitive","value":true},{"name":"isMalicious","value":false},{"name":"businessCriticality","value":"high"},{"name":"relativeImportance","value":"medium"},{"name":"relativePopularityRank","value":99},{"name":"impact","value":5.99},{"name":"likelihood","value":2.42},{"name":"scoreVersion","value":"V5"}],"severity":"medium","title":"Denial of Service (DoS)"}],"prId":"6440ea34-19fa-4e35-918f-567fc6106bd4","prPublicId":"6440ea34-19fa-4e35-918f-567fc6106bd4","packageManager":"maven","priorityScoreList":[101,114,146,146],"projectPublicId":"863565ea-8720-48d4-8818-7e58bbb8026d","projectUrl":"https://app.snyk.io/org/pinterest-open-source-repos/project/863565ea-8720-48d4-8818-7e58bbb8026d?utm_source=github&utm_medium=referral&page=fix-pr","prType":"fix","templateFieldSources":{"branchName":"default","commitMessage":"default","description":"default","title":"default"},"templateVariants":["updated-fix-title","priorityScore"],"type":"auto","upgrade":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426"],"vulns":["SNYK-JAVA-COMFASTERXMLJACKSONCORE-2326698","SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424","SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426"],"patch":[],"isBreakingChange":false,"remediationStrategy":"vuln"}'