[Snyk] Upgrade @playwright/test from 1.19.0-alpha-1643749494000 to 1.43.1 #1176
Security Report
You have successfully remediated 24 vulnerabilities, but introduced 4 new vulnerabilities in this branch.
❌ New vulnerabilities:
CVE | Severity | CVSS Score | Vulnerable Library | Suggested Fix | Issue |
---|---|---|---|---|---|
CVE-2024-30172Path to dependency file: /packages/playwright-core/src/server/android/driver/app/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15on/1.64/513f78dc2971d73eec9716788948ec02704899aa/bcprov-jdk15on-1.64.pom Dependency Hierarchy: -> ❌ bcprov-jdk15on-1.64.jar (Vulnerable Library) |
Medium | 5.9 | bcprov-jdk15on-1.64.jar | Upgrade to version: org.bouncycastle:bcprov-jdk18on:1.78,org.bouncycastle:bcprov-jdk15to18:1.78, org.bouncycastle:bcprov-jdk14:1.78 | None |
CVE-2024-30172Path to dependency file: /packages/playwright-core/src/server/android/driver/app/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15on/1.56/a153c6f9744a3e9dd6feab5e210e1c9861362ec7/bcprov-jdk15on-1.56.jar Dependency Hierarchy: -> lint-gradle-27.1.0.jar (Root Library) -> sdk-common-27.1.0.jar -> ❌ bcprov-jdk15on-1.56.jar (Vulnerable Library) |
Medium | 5.9 | bcprov-jdk15on-1.56.jar | Upgrade to version: org.bouncycastle:bcprov-jdk18on:1.78,org.bouncycastle:bcprov-jdk15to18:1.78, org.bouncycastle:bcprov-jdk14:1.78 | None |
CVE-2018-1324Path to dependency file: /packages/playwright-core/src/server/android/driver/app/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar Dependency Hierarchy: -> lint-gradle-27.1.0.jar (Root Library) -> sdk-common-27.1.0.jar -> sdklib-27.1.0.jar -> ❌ commons-compress-1.12.jar (Vulnerable Library) |
Medium | 5.5 | commons-compress-1.12.jar | Upgrade to version: 1.16 | #18 |
CVE-2018-11771Path to dependency file: /packages/playwright-core/src/server/android/driver/app/build.gradle Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.commons/commons-compress/1.12/84caa68576e345eb5e7ae61a0e5a9229eb100d7b/commons-compress-1.12.jar Dependency Hierarchy: -> lint-gradle-27.1.0.jar (Root Library) -> sdk-common-27.1.0.jar -> sdklib-27.1.0.jar -> ❌ commons-compress-1.12.jar (Vulnerable Library) |
Medium | 5.5 | commons-compress-1.12.jar | Upgrade to version: 1.18 | #16 |
✔️ Remediated vulnerabilities:
CVE | Vulnerable Library |
---|---|
CVE-2022-25881 | http-cache-semantics-4.1.0.tgz |
CVE-2022-37601 | loader-utils-1.4.0.tgz |
CVE-2022-29247 | electron-12.2.1.tgz |
CVE-2022-46175 | json5-1.0.1.tgz |
CVE-2022-37603 | loader-utils-2.0.0.tgz |
CVE-2022-25883 | semver-7.3.5.tgz |
CVE-2023-26115 | word-wrap-1.2.3.tgz |
CVE-2023-39956 | electron-12.2.1.tgz |
CVE-2023-44402 | electron-12.2.1.tgz |
CVE-2022-21718 | electron-12.2.1.tgz |
CVE-2022-33987 | got-9.6.0.tgz |
CVE-2022-37603 | loader-utils-1.4.0.tgz |
CVE-2023-29198 | electron-12.2.1.tgz |
CVE-2023-44270 | postcss-8.3.9.tgz |
CVE-2022-37599 | loader-utils-2.0.0.tgz |
CVE-2022-25883 | semver-5.7.1.tgz |
CVE-2021-33502 | normalize-url-4.5.0.tgz |
CVE-2022-37601 | loader-utils-2.0.0.tgz |
CVE-2023-28154 | webpack-5.68.0.tgz |
CVE-2023-2968 | proxy-1.0.2.tgz |
CVE-2022-36077 | electron-12.2.1.tgz |
CVE-2022-29257 | electron-12.2.1.tgz |
CVE-2022-25858 | terser-5.10.0.tgz |
CVE-2022-24999 | qs-6.9.3.tgz |
Base branch total remaining vulnerabilities: 64
Base branch commit: null
Total libraries scanned: 354
Scan token: ac76016cddc744909166b320a1ba946a