PyPi: Watchui

CVE-2022-22816

Transitive

Safety vulnerability ID: 46432

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jan 10, 2022 Updated at Nov 29, 2024
Scan your Python projects for vulnerabilities →

Advisory

Watchui 2.0.1 updates its dependency 'pillow' to v9.0.0 to include security fixes.

Affected package

watchui

Latest version: 2.0.12

RobotFramework library package for automated visual testing.

Affected versions

Fixed versions

Vulnerability changelog

WatchUI ver2.0.1

Breaking changes

WatchUI 2.0 brings breaking changes. Dev team decided to streamline the library and focus it solely on the image and text comparison. This allows us to remove the implicit dependency on browser automation libraries - namely SeleniumLibrary, which was implicit part of the library via RF BuiltIn() import of the SeleniumLibrary instance.

This is no longer the case - user of the WatchUI therefore can and have to choose, what UI automation library will use and provide screenshots to the WatchUI keywords to be compared. It could be now used with SeleniumLibrary, Browser library, Sikuli, Appium or any other UI library where visual validation is required.

Version 1.x.x is no longer supported, but it is still available on [Pypi](pip install WatchUI==1.0.11).


- Completly description 84
- Add some security 88

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 6.5

CVSS v3 Details

MEDIUM 6.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
LOW
Availability Availability (A)
LOW

CVSS v2 Details

MEDIUM 6.4
Access Vector (AV)
NETWORK
Access Complexity (AC)
LOW
Authentication (Au)
NONE
Confidentiality Impact (C)
NONE
Integrity Impact (I)
PARTIAL
Availability Impact (A)
PARTIAL