Update dependency junit:junit to v4.13.1 (main) #18
Mend for GitHub.com / WhiteSource Security Check
succeeded
Dec 6, 2025 in 3m 3s
Security Report
❗️Scan Incomplete: The scan completed with partial failure. The integration encountered issues with one or more projects in this repository, preventing their scan. The errors occurred in the following package managers: gradle. Consequently, there may be gaps in the coverage of open-source dependencies used in the repository.
Scan Details Report
gradle
/tmp/ws-scm/Client-Get-Started-InApp-Voice-Android-Java/GetStartedCalls-Complete/build.gradle
| Step | Level | Description | Details |
|---|---|---|---|
| Preparing the project for scan | ⚠Warn | One or more of the installations failed | failed running mend init script (mendDeps): NOTE: Picked up JDK_JAVA_OPTIONS: --add-opens java.base/java.util=ALL-UNNAMED --add-opens java.base/sun.reflect.generics.reflectiveObjects=ALL-UNNAMED FAILURE: Build failed with an exception. * Where: Build file '/tmp/ws-scm/Client-Get-Started-InApp-Voice-Android-Java/GetStartedCalls-Complete/app/build.gradle' line: 1 * What went wrong: A problem o... |
/tmp/ws-scm/Client-Get-Started-InApp-Voice-Android-Java/GetStartedCalls-Start/build.gradle
| Step | Level | Description | Details |
|---|---|---|---|
| Preparing the project for scan | ⚠Warn | One or more of the installations failed | failed running mend init script (mendDeps): NOTE: Picked up JDK_JAVA_OPTIONS: --add-opens java.base/java.util=ALL-UNNAMED --add-opens java.base/sun.reflect.generics.reflectiveObjects=ALL-UNNAMED FAILURE: Build failed with an exception. * Where: Build file '/tmp/ws-scm/Client-Get-Started-InApp-Voice-Android-Java/GetStartedCalls-Complete/app/build.gradle' line: 1 * What went wrong: A problem o... |
✔️ 👍 You have successfully remediated 36 vulnerabilities in this branch:
| Vulnerability | Vulnerable Library |
|---|---|
| CVE-2020-15250 | junit-4.12.jar |
| CVE-2022-25647 | gson-2.8.5.jar |
| CVE-2024-7254 | protobuf-java-3.4.0.jar |
| CVE-2020-26939 | bcprov-jdk15on-1.56.jar |
| CVE-2022-3510 | protobuf-java-3.10.0.jar |
| WS-2021-0419 | gson-2.8.5.jar |
| CVE-2023-33202 | bcprov-jdk15on-1.56.jar |
| CVE-2022-25867 | socket.io-client-1.0.0.jar |
| CVE-2022-3171 | protobuf-java-3.10.0.jar |
| CVE-2023-3635 | okio-2.4.1.jar |
| CVE-2024-7254 | protobuf-java-3.10.0.jar |
| CVE-2023-2976 | guava-28.1-jre.jar |
| CVE-2024-30172 | bcprov-jdk15on-1.56.jar |
| CVE-2020-8908 | guava-27.0.1-jre.jar |
| CVE-2022-3509 | protobuf-java-3.10.0.jar |
| CVE-2019-17359 | bcprov-jdk15on-1.56.jar |
| CVE-2022-24329 | kotlin-stdlib-1.3.72.jar |
| CVE-2022-25647 | gson-2.8.6.jar |
| CVE-2020-13956 | httpclient-4.5.6.jar |
| CVE-2023-33201 | bcprov-jdk15on-1.56.jar |
| WS-2021-0419 | gson-2.8.6.jar |
| CVE-2018-1000180 | bcprov-jdk15on-1.56.jar |
| CVE-2022-3510 | protobuf-java-3.4.0.jar |
| CVE-2020-8908 | guava-28.1-jre.jar |
| WS-2019-0379 | commons-codec-1.10.jar |
| CVE-2022-24329 | kotlin-stdlib-1.3.41.jar |
| CVE-2024-30171 | bcprov-jdk15on-1.56.jar |
| CVE-2023-0833 | okhttp-4.3.0.jar |
| CVE-2024-25710 | commons-compress-1.12.jar |
| CVE-2018-11771 | commons-compress-1.12.jar |
| CVE-2020-15250 | junit-4.13.jar |
| CVE-2023-2976 | guava-27.0.1-jre.jar |
| CVE-2022-3509 | protobuf-java-3.4.0.jar |
| CVE-2022-3171 | protobuf-java-3.4.0.jar |
| CVE-2024-29857 | bcprov-jdk15on-1.56.jar |
| CVE-2022-24329 | kotlin-stdlib-1.3.61.jar |
Base branch total remaining vulnerabilities: 36
Base branch commit: null
Total libraries scanned: 1
Scan token: cb68891d38af45538a0247400505300d
Loading