This repository has been archived by the owner on Dec 20, 2023. It is now read-only.
chore(deps): update dependency karma-sauce-launcher to v1 (master) #41
Appcues WSS / WhiteSource Security Check
succeeded
Dec 7, 2023 in 3m 6s
Security Report
✔️ 👍 Way to go! You have successfully remediated 85 vulnerabilities in this branch:
CVE | Vulnerable Library |
---|---|
CVE-2017-20165 | debug-2.2.0.tgz |
CVE-2022-0536 | follow-redirects-1.14.4.tgz |
WS-2021-0638 | mocha-2.5.3.tgz |
CVE-2019-10744 | lodash-3.10.1.tgz |
CVE-2021-44906 | minimist-1.2.5.tgz |
CVE-2022-41940 | engine.io-1.6.9.tgz |
WS-2019-0425 | mocha-2.5.3.tgz |
CVE-2022-21704 | log4js-0.6.38.tgz |
CVE-2021-23807 | jsonpointer-4.1.0.tgz |
CVE-2016-10540 | minimatch-2.0.10.tgz |
CVE-2021-31597 | xmlhttprequest-ssl-1.5.1.tgz |
CVE-2019-1010266 | lodash-3.10.1.tgz |
CVE-2022-29167 | hawk-2.3.1.tgz |
CVE-2022-24999 | qs-2.4.2.tgz |
WS-2018-0590 | diff-1.4.0.tgz |
CVE-2018-3721 | lodash-3.10.1.tgz |
CVE-2018-16487 | lodash-3.9.3.tgz |
CVE-2020-28500 | lodash-3.9.3.tgz |
CVE-2021-23337 | lodash-3.9.3.tgz |
CVE-2017-16137 | debug-2.2.0.tgz |
WS-2018-0076 | tunnel-agent-0.4.3.tgz |
CVE-2019-1010266 | lodash-3.9.3.tgz |
CVE-2017-20162 | ms-0.7.1.tgz |
CVE-2022-46175 | json5-0.5.1.tgz |
CVE-2021-23337 | lodash-3.2.0.tgz |
CVE-2020-8203 | lodash-3.9.3.tgz |
CVE-2021-23337 | lodash-3.10.1.tgz |
WS-2017-3757 | content-type-parser-1.0.2.tgz |
CVE-2021-23495 | karma-0.13.22.tgz |
CVE-2017-16026 | request-2.55.0.tgz |
CVE-2016-10542 | ws-1.0.1.tgz |
CVE-2020-28500 | lodash-3.2.0.tgz |
CVE-2023-26115 | word-wrap-1.2.3.tgz |
CVE-2016-10539 | negotiator-0.4.9.tgz |
CVE-2016-10540 | minimatch-0.3.0.tgz |
CVE-2022-2421 | socket.io-parser-2.2.2.tgz |
CVE-2022-38900 | decode-uri-component-0.2.0.tgz |
CVE-2018-16487 | lodash-3.2.0.tgz |
WS-2017-0421 | ws-1.0.1.tgz |
CVE-2020-36049 | socket.io-parser-2.2.2.tgz |
CVE-2022-0155 | follow-redirects-1.14.4.tgz |
CVE-2017-16113 | parsejson-0.0.1.tgz |
CVE-2021-44906 | minimist-0.0.10.tgz |
CVE-2018-3721 | lodash-3.2.0.tgz |
WS-2020-0443 | socket.io-1.4.6.tgz |
CVE-2023-26136 | tough-cookie-2.5.0.tgz |
CVE-2017-16042 | growl-1.9.2.tgz |
WS-2017-3772 | underscore.string-3.0.3.tgz |
CVE-2020-7598 | minimist-0.0.8.tgz |
WS-2017-0266 | http-signature-0.10.1.tgz |
CVE-2022-3517 | minimatch-2.0.10.tgz |
CVE-2019-10744 | lodash-3.2.0.tgz |
CVE-2020-36049 | socket.io-parser-2.2.6.tgz |
CVE-2021-3918 | json-schema-0.2.3.tgz |
CVE-2016-2515 | hawk-2.3.1.tgz |
CVE-2020-28481 | socket.io-1.4.6.tgz |
CVE-2022-37601 | loader-utils-0.2.17.tgz |
CVE-2022-24999 | qs-6.5.2.tgz |
CVE-2023-28155 | request-2.55.0.tgz |
CVE-2020-8203 | lodash-3.2.0.tgz |
CVE-2020-8244 | bl-0.9.5.tgz |
CVE-2020-28500 | lodash-3.10.1.tgz |
CVE-2022-3517 | minimatch-0.3.0.tgz |
CVE-2018-16487 | lodash-3.10.1.tgz |
CVE-2018-1000620 | cryptiles-2.0.5.tgz |
CVE-2020-36048 | engine.io-1.6.9.tgz |
CVE-2019-1010266 | lodash-3.2.0.tgz |
CVE-2017-16137 | debug-0.7.4.tgz |
CVE-2023-45133 | babel-traverse-6.26.0.tgz |
CVE-2022-0437 | karma-0.13.22.tgz |
WS-2018-0650 | useragent-2.3.0.tgz |
CVE-2020-28502 | xmlhttprequest-ssl-1.5.1.tgz |
CVE-2018-3721 | lodash-3.9.3.tgz |
CVE-2020-8203 | lodash-3.10.1.tgz |
CVE-2018-3728 | hoek-2.16.3.tgz |
CVE-2019-10744 | lodash-3.9.3.tgz |
CVE-2020-7598 | minimist-0.0.10.tgz |
CVE-2020-28469 | glob-parent-2.0.0.tgz |
WS-2017-0107 | ws-1.0.1.tgz |
CVE-2017-20165 | debug-0.7.4.tgz |
CVE-2017-1000048 | qs-2.4.2.tgz |
CVE-2021-44906 | minimist-0.0.8.tgz |
CVE-2022-24999 | qs-6.7.0.tgz |
CVE-2023-28155 | request-2.88.2.tgz |
CVE-2022-3517 | minimatch-3.0.4.tgz |
Base branch total remaining vulnerabilities: 86
Base branch commit: null
Total libraries scanned: 2
Scan token: a08c50580ff6411083f627f6a6a8326b
Loading