twilio / media-streams

Quick start guides for configuring and consuming Twilio Media Streams
105 stars 80 forks source link

[Snyk] Fix for 14 vulnerabilities #197

Open twilio-product-security opened 2 years ago

twilio-product-security commented 2 years ago

Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity
high severity 599/1000
Why? Has a fix available, CVSS 7.7
Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLECODEGSON-1730327
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
No No Known Exploit
low severity 486/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.3
Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
No Proof of Concept
high severity 589/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-COMGOOGLEPROTOBUF-2331703
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
Yes No Known Exploit
medium severity 571/1000
Why? Recently disclosed, Has a fix available, CVSS 5.7
Denial of Service (DoS)
SNYK-JAVA-COMGOOGLEPROTOBUF-3040284
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
Yes No Known Exploit
medium severity 509/1000
Why? Has a fix available, CVSS 5.9
Information Exposure
SNYK-JAVA-IOGRPC-571957
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Improper Input Validation
SNYK-JAVA-ORGAPACHEHTTPCOMPONENTS-1048058
com.google.cloud:google-cloud-speech:
1.8.0 -> 2.6.0
No No Known Exploit
high severity 711/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.8
Privilege Escalation
SNYK-JAVA-ORGECLIPSEJETTY-1021614
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No Proof of Concept
medium severity 454/1000
Why? Has a fix available, CVSS 4.8
HTTP Request Smuggling
SNYK-JAVA-ORGECLIPSEJETTY-1047304
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No No Known Exploit
medium severity 586/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.3
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1080611
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No Proof of Concept
high severity 696/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGECLIPSEJETTY-1090340
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No Proof of Concept
low severity 359/1000
Why? Has a fix available, CVSS 2.9
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-1313686
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No No Known Exploit
medium severity 479/1000
Why? Has a fix available, CVSS 5.3
Information Exposure
SNYK-JAVA-ORGECLIPSEJETTY-174560
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No No Known Exploit
low severity 349/1000
Why? Has a fix available, CVSS 2.7
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945452
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No No Known Exploit
low severity 349/1000
Why? Has a fix available, CVSS 2.7
Improper Input Validation
SNYK-JAVA-ORGECLIPSEJETTY-2945453
com.sparkjava:spark-core:
2.8.0 -> 2.9.4
No No Known Exploit

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information: 🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Deserialization of Untrusted Data 🦉 Denial of Service (DoS) 🦉 Denial of Service (DoS)