This repository has been archived by the owner on Dec 20, 2023. It is now read-only.
chore(deps): update dependency semantic-release to v22 (master) #106
Appcues WSS / WhiteSource Security Check
succeeded
Dec 13, 2023 in 2m 9s
Security Report
✔️ 👍 Way to go! You have successfully remediated 122 vulnerabilities in this branch:
CVE | Vulnerable Library |
---|---|
CVE-2022-0512 | url-parse-1.1.9.tgz |
CVE-2017-15010 | tough-cookie-2.3.2.tgz |
CVE-2021-3803 | nth-check-1.0.1.tgz |
CVE-2018-1107 | is-my-json-valid-2.16.0.tgz |
CVE-2017-20165 | debug-2.6.8.tgz |
CVE-2020-28500 | lodash-4.17.2.tgz |
CVE-2020-15366 | ajv-4.11.8.tgz |
CVE-2020-8124 | url-parse-1.1.9.tgz |
CVE-2021-33623 | trim-newlines-2.0.0.tgz |
WS-2018-0069 | is-my-json-valid-2.16.0.tgz |
WS-2020-0344 | is-my-json-valid-2.16.0.tgz |
CVE-2018-21270 | stringstream-0.0.5.tgz |
WS-2018-0347 | eslint-2.13.1.tgz |
CVE-2022-21222 | css-what-2.1.0.tgz |
CVE-2020-8124 | url-parse-1.0.5.tgz |
CVE-2021-23337 | lodash-4.17.4.tgz |
MSC-2023-16606 | fsevents-1.1.2.tgz |
CVE-2018-3721 | lodash-4.17.2.tgz |
CVE-2023-45311 | fsevents-1.1.2.tgz |
WS-2019-0017 | clean-css-4.1.7.tgz |
CVE-2018-3737 | sshpk-1.13.1.tgz |
CVE-2021-37713 | tar-2.2.1.tgz |
CVE-2021-3918 | json-schema-0.2.3.tgz |
CVE-2022-37601 | loader-utils-0.2.17.tgz |
CVE-2022-0691 | url-parse-1.0.5.tgz |
CVE-2018-3774 | url-parse-1.0.5.tgz |
CVE-2018-1000620 | cryptiles-2.0.5.tgz |
CVE-2022-25883 | semver-5.7.1.tgz |
CVE-2021-23337 | lodash-4.17.2.tgz |
CVE-2019-13173 | fstream-1.0.11.tgz |
CVE-2021-33623 | trim-newlines-1.0.0.tgz |
CVE-2021-27515 | url-parse-1.0.5.tgz |
CVE-2019-10744 | lodash-4.17.4.tgz |
CVE-2022-25883 | semver-4.3.6.tgz |
CVE-2018-20834 | tar-2.2.1.tgz |
WS-2018-0107 | open-0.0.5.tgz |
CVE-2022-37620 | html-minifier-3.5.3.tgz |
CVE-2018-16492 | extend-3.0.1.tgz |
CVE-2020-28499 | merge-1.2.0.tgz |
WS-2021-0638 | mocha-3.5.0.tgz |
CVE-2021-27292 | ua-parser-js-0.7.14.tgz |
CVE-2020-28500 | lodash-4.17.4.tgz |
CVE-2020-28469 | glob-parent-2.0.0.tgz |
CVE-2021-23807 | jsonpointer-4.0.1.tgz |
CVE-2021-3664 | url-parse-1.1.9.tgz |
CVE-2021-32804 | tar-2.2.1.tgz |
CVE-2022-29167 | hawk-3.1.3.tgz |
CVE-2021-37712 | tar-2.2.1.tgz |
CVE-2022-0639 | url-parse-1.0.5.tgz |
WS-2019-0032 | js-yaml-3.9.1.tgz |
CVE-2019-10744 | lodash-4.17.2.tgz |
CVE-2020-7693 | sockjs-0.3.18.tgz |
CVE-2018-14732 | webpack-dev-server-1.16.5.tgz |
CVE-2021-27290 | ssri-5.3.0.tgz |
CVE-2022-0144 | shelljs-0.7.6.tgz |
CVE-2017-16138 | mime-1.3.6.tgz |
CVE-2017-16099 | no-case-2.3.1.tgz |
CVE-2018-3750 | deep-extend-0.4.2.tgz |
CVE-2021-3664 | url-parse-1.0.5.tgz |
CVE-2020-7598 | minimist-1.2.0.tgz |
CVE-2022-46175 | json5-0.5.1.tgz |
CVE-2021-32803 | tar-2.2.1.tgz |
CVE-2018-16487 | lodash-4.17.2.tgz |
WS-2019-0425 | mocha-3.5.0.tgz |
WS-2018-0114 | npmconf-2.1.2.tgz |
CVE-2017-16138 | mime-1.3.4.tgz |
CVE-2020-7788 | ini-1.3.4.tgz |
CVE-2023-26115 | word-wrap-1.2.3.tgz |
CVE-2020-26226 | semantic-release-8.2.3.tgz |
CVE-2022-38900 | decode-uri-component-0.2.0.tgz |
CVE-2022-24999 | qs-6.5.0.tgz |
CVE-2022-0686 | url-parse-1.1.9.tgz |
CVE-2023-28155 | request-2.81.0.tgz |
CVE-2017-16137 | debug-2.6.8.tgz |
CVE-2018-3774 | url-parse-1.1.9.tgz |
WS-2020-0342 | is-my-json-valid-2.16.0.tgz |
CVE-2020-7733 | ua-parser-js-0.7.14.tgz |
CVE-2017-16118 | forwarded-0.1.0.tgz |
CVE-2017-16028 | randomatic-1.1.7.tgz |
CVE-2017-16042 | growl-1.9.2.tgz |
CVE-2020-7598 | minimist-0.0.8.tgz |
CVE-2018-16487 | lodash-4.17.4.tgz |
CVE-2021-27515 | url-parse-1.1.9.tgz |
CVE-2019-1010266 | lodash-4.17.2.tgz |
CVE-2020-8116 | dot-prop-3.0.0.tgz |
WS-2018-0590 | diff-3.2.0.tgz |
WS-2018-0588 | querystringify-0.0.4.tgz |
CVE-2021-44906 | minimist-1.2.0.tgz |
CVE-2018-16469 | merge-1.2.0.tgz |
CVE-2021-3807 | ansi-regex-3.0.0.tgz |
CVE-2022-0686 | url-parse-1.0.5.tgz |
CVE-2020-8203 | lodash-4.17.4.tgz |
CVE-2022-0536 | follow-redirects-1.2.6.tgz |
CVE-2017-16119 | fresh-0.5.0.tgz |
WS-2018-0588 | querystringify-1.0.0.tgz |
CVE-2021-23358 | underscore-1.4.4.tgz |
WS-2020-0345 | jsonpointer-4.0.1.tgz |
CVE-2022-25881 | http-cache-semantics-3.8.1.tgz |
CVE-2018-6341 | react-dom-16.1.1.tgz |
CVE-2018-3721 | lodash-4.17.4.tgz |
CVE-2019-1010266 | lodash-4.17.4.tgz |
CVE-2020-15168 | node-fetch-1.7.2.tgz |
CVE-2020-7793 | ua-parser-js-0.7.14.tgz |
CVE-2022-33987 | got-8.3.2.tgz |
CVE-2022-0155 | follow-redirects-1.2.6.tgz |
CVE-2020-8203 | lodash-4.17.2.tgz |
WS-2020-0091 | http-proxy-1.16.2.tgz |
CVE-2022-0639 | url-parse-1.1.9.tgz |
WS-2018-0103 | stringstream-0.0.5.tgz |
CVE-2020-7662 | websocket-extensions-0.1.1.tgz |
CVE-2018-3728 | hoek-2.16.3.tgz |
CVE-2023-26136 | tough-cookie-2.3.2.tgz |
CVE-2022-0512 | url-parse-1.0.5.tgz |
CVE-2021-37701 | tar-2.2.1.tgz |
WS-2019-0063 | js-yaml-3.9.1.tgz |
CVE-2022-0144 | shelljs-0.6.1.tgz |
CVE-2022-0691 | url-parse-1.1.9.tgz |
CVE-2022-0235 | node-fetch-1.7.2.tgz |
CVE-2022-24999 | qs-6.4.0.tgz |
CVE-2022-1650 | eventsource-0.1.6.tgz |
CVE-2021-44906 | minimist-0.0.8.tgz |
CVE-2022-3517 | minimatch-3.0.4.tgz |
Base branch total remaining vulnerabilities: 122
Base branch commit: null
Total libraries scanned: 1
Scan token: 5d1a4f2e661c41da8dfe6f0ef0377a89
Loading