Skip to content
This repository has been archived by the owner on Dec 20, 2023. It is now read-only.

chore(deps): update dependency semantic-release to v22 (master) #106

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

chore(deps): update dependency semantic-release to v22

24332e1
Select commit
Loading
Failed to load commit list.
Open

chore(deps): update dependency semantic-release to v22 (master) #106

chore(deps): update dependency semantic-release to v22
24332e1
Select commit
Loading
Failed to load commit list.
Appcues WSS / WhiteSource Security Check succeeded Dec 13, 2023 in 2m 9s

Security Report

✔️ 👍 Way to go! You have successfully remediated 122 vulnerabilities in this branch:

CVE Vulnerable Library
CVE-2022-0512 url-parse-1.1.9.tgz
CVE-2017-15010 tough-cookie-2.3.2.tgz
CVE-2021-3803 nth-check-1.0.1.tgz
CVE-2018-1107 is-my-json-valid-2.16.0.tgz
CVE-2017-20165 debug-2.6.8.tgz
CVE-2020-28500 lodash-4.17.2.tgz
CVE-2020-15366 ajv-4.11.8.tgz
CVE-2020-8124 url-parse-1.1.9.tgz
CVE-2021-33623 trim-newlines-2.0.0.tgz
WS-2018-0069 is-my-json-valid-2.16.0.tgz
WS-2020-0344 is-my-json-valid-2.16.0.tgz
CVE-2018-21270 stringstream-0.0.5.tgz
WS-2018-0347 eslint-2.13.1.tgz
CVE-2022-21222 css-what-2.1.0.tgz
CVE-2020-8124 url-parse-1.0.5.tgz
CVE-2021-23337 lodash-4.17.4.tgz
MSC-2023-16606 fsevents-1.1.2.tgz
CVE-2018-3721 lodash-4.17.2.tgz
CVE-2023-45311 fsevents-1.1.2.tgz
WS-2019-0017 clean-css-4.1.7.tgz
CVE-2018-3737 sshpk-1.13.1.tgz
CVE-2021-37713 tar-2.2.1.tgz
CVE-2021-3918 json-schema-0.2.3.tgz
CVE-2022-37601 loader-utils-0.2.17.tgz
CVE-2022-0691 url-parse-1.0.5.tgz
CVE-2018-3774 url-parse-1.0.5.tgz
CVE-2018-1000620 cryptiles-2.0.5.tgz
CVE-2022-25883 semver-5.7.1.tgz
CVE-2021-23337 lodash-4.17.2.tgz
CVE-2019-13173 fstream-1.0.11.tgz
CVE-2021-33623 trim-newlines-1.0.0.tgz
CVE-2021-27515 url-parse-1.0.5.tgz
CVE-2019-10744 lodash-4.17.4.tgz
CVE-2022-25883 semver-4.3.6.tgz
CVE-2018-20834 tar-2.2.1.tgz
WS-2018-0107 open-0.0.5.tgz
CVE-2022-37620 html-minifier-3.5.3.tgz
CVE-2018-16492 extend-3.0.1.tgz
CVE-2020-28499 merge-1.2.0.tgz
WS-2021-0638 mocha-3.5.0.tgz
CVE-2021-27292 ua-parser-js-0.7.14.tgz
CVE-2020-28500 lodash-4.17.4.tgz
CVE-2020-28469 glob-parent-2.0.0.tgz
CVE-2021-23807 jsonpointer-4.0.1.tgz
CVE-2021-3664 url-parse-1.1.9.tgz
CVE-2021-32804 tar-2.2.1.tgz
CVE-2022-29167 hawk-3.1.3.tgz
CVE-2021-37712 tar-2.2.1.tgz
CVE-2022-0639 url-parse-1.0.5.tgz
WS-2019-0032 js-yaml-3.9.1.tgz
CVE-2019-10744 lodash-4.17.2.tgz
CVE-2020-7693 sockjs-0.3.18.tgz
CVE-2018-14732 webpack-dev-server-1.16.5.tgz
CVE-2021-27290 ssri-5.3.0.tgz
CVE-2022-0144 shelljs-0.7.6.tgz
CVE-2017-16138 mime-1.3.6.tgz
CVE-2017-16099 no-case-2.3.1.tgz
CVE-2018-3750 deep-extend-0.4.2.tgz
CVE-2021-3664 url-parse-1.0.5.tgz
CVE-2020-7598 minimist-1.2.0.tgz
CVE-2022-46175 json5-0.5.1.tgz
CVE-2021-32803 tar-2.2.1.tgz
CVE-2018-16487 lodash-4.17.2.tgz
WS-2019-0425 mocha-3.5.0.tgz
WS-2018-0114 npmconf-2.1.2.tgz
CVE-2017-16138 mime-1.3.4.tgz
CVE-2020-7788 ini-1.3.4.tgz
CVE-2023-26115 word-wrap-1.2.3.tgz
CVE-2020-26226 semantic-release-8.2.3.tgz
CVE-2022-38900 decode-uri-component-0.2.0.tgz
CVE-2022-24999 qs-6.5.0.tgz
CVE-2022-0686 url-parse-1.1.9.tgz
CVE-2023-28155 request-2.81.0.tgz
CVE-2017-16137 debug-2.6.8.tgz
CVE-2018-3774 url-parse-1.1.9.tgz
WS-2020-0342 is-my-json-valid-2.16.0.tgz
CVE-2020-7733 ua-parser-js-0.7.14.tgz
CVE-2017-16118 forwarded-0.1.0.tgz
CVE-2017-16028 randomatic-1.1.7.tgz
CVE-2017-16042 growl-1.9.2.tgz
CVE-2020-7598 minimist-0.0.8.tgz
CVE-2018-16487 lodash-4.17.4.tgz
CVE-2021-27515 url-parse-1.1.9.tgz
CVE-2019-1010266 lodash-4.17.2.tgz
CVE-2020-8116 dot-prop-3.0.0.tgz
WS-2018-0590 diff-3.2.0.tgz
WS-2018-0588 querystringify-0.0.4.tgz
CVE-2021-44906 minimist-1.2.0.tgz
CVE-2018-16469 merge-1.2.0.tgz
CVE-2021-3807 ansi-regex-3.0.0.tgz
CVE-2022-0686 url-parse-1.0.5.tgz
CVE-2020-8203 lodash-4.17.4.tgz
CVE-2022-0536 follow-redirects-1.2.6.tgz
CVE-2017-16119 fresh-0.5.0.tgz
WS-2018-0588 querystringify-1.0.0.tgz
CVE-2021-23358 underscore-1.4.4.tgz
WS-2020-0345 jsonpointer-4.0.1.tgz
CVE-2022-25881 http-cache-semantics-3.8.1.tgz
CVE-2018-6341 react-dom-16.1.1.tgz
CVE-2018-3721 lodash-4.17.4.tgz
CVE-2019-1010266 lodash-4.17.4.tgz
CVE-2020-15168 node-fetch-1.7.2.tgz
CVE-2020-7793 ua-parser-js-0.7.14.tgz
CVE-2022-33987 got-8.3.2.tgz
CVE-2022-0155 follow-redirects-1.2.6.tgz
CVE-2020-8203 lodash-4.17.2.tgz
WS-2020-0091 http-proxy-1.16.2.tgz
CVE-2022-0639 url-parse-1.1.9.tgz
WS-2018-0103 stringstream-0.0.5.tgz
CVE-2020-7662 websocket-extensions-0.1.1.tgz
CVE-2018-3728 hoek-2.16.3.tgz
CVE-2023-26136 tough-cookie-2.3.2.tgz
CVE-2022-0512 url-parse-1.0.5.tgz
CVE-2021-37701 tar-2.2.1.tgz
WS-2019-0063 js-yaml-3.9.1.tgz
CVE-2022-0144 shelljs-0.6.1.tgz
CVE-2022-0691 url-parse-1.1.9.tgz
CVE-2022-0235 node-fetch-1.7.2.tgz
CVE-2022-24999 qs-6.4.0.tgz
CVE-2022-1650 eventsource-0.1.6.tgz
CVE-2021-44906 minimist-0.0.8.tgz
CVE-2022-3517 minimatch-3.0.4.tgz

Base branch total remaining vulnerabilities: 122
Base branch commit: null


Total libraries scanned: 1

Scan token: 5d1a4f2e661c41da8dfe6f0ef0377a89