chore(deps): update dependency socket.io to v4 #101
Security Report
You have successfully remediated 81 vulnerabilities, but introduced 38 new vulnerabilities in this branch.
❌ New vulnerabilities:
CVE | Severity | CVSS Score | Vulnerable Library | Suggested Fix | Issue |
---|---|---|---|---|---|
CVE-2022-2421Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-parser/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ socket.io-parser-2.2.4.tgz (Vulnerable Library) |
Critical | 9.8 | socket.io-parser-2.2.4.tgz | Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 | #95 |
CVE-2022-2421Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/socket.io-parser/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-adapter-0.3.1.tgz -> ❌ socket.io-parser-2.2.2.tgz (Vulnerable Library) |
Critical | 9.8 | socket.io-parser-2.2.2.tgz | Upgrade to version: socket.io-parser - 3.3.3,3.4.2,4.0.5,4.2.1;org.webjars.npm:socket.io-parser:4.0.5,4.2.1 | #95 |
CVE-2019-10744Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
Critical | 9.1 | lodash-2.4.2.tgz | Upgrade to version: lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0 | #8 |
WS-2020-0443Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/package.json Dependency Hierarchy: -> ❌ socket.io-1.3.7.tgz (Vulnerable Library) |
High | 8.1 | socket.io-1.3.7.tgz | Upgrade to version: socket.io - 2.4.0 | #59 |
CVE-2020-28502Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/xmlhttprequest/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-client-1.3.7.tgz -> engine.io-client-1.5.4.tgz -> ❌ xmlhttprequest-1.5.0.tgz (Vulnerable Library) |
High | 8.1 | xmlhttprequest-1.5.0.tgz | Upgrade to version: xmlhttprequest - 1.7.0,xmlhttprequest-ssl - 1.6.2 | #50 |
WS-2017-0421Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/ws/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ ws-0.8.0.tgz (Vulnerable Library) |
High | 7.5 | ws-0.8.0.tgz | Upgrade to version: ws - 1.1.5,3.3.1 | None |
CVE-2022-24999Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/qs/package.json Dependency Hierarchy: -> express-4.13.4.tgz (Root Library) -> ❌ qs-4.0.0.tgz (Vulnerable Library) |
High | 7.5 | qs-4.0.0.tgz | Upgrade to version: qs - 6.2.4,6.3.3,6.4.1,6.5.3,6.6.1,6.7.3,6.8.3,6.9.7,6.10.3 | #76 |
CVE-2020-36049Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-parser/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ socket.io-parser-2.2.4.tgz (Vulnerable Library) |
High | 7.5 | socket.io-parser-2.2.4.tgz | Upgrade to version: socket.io-parser - 3.3.2,3.4.1 | #53 |
CVE-2020-36049Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/socket.io-parser/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-adapter-0.3.1.tgz -> ❌ socket.io-parser-2.2.2.tgz (Vulnerable Library) |
High | 7.5 | socket.io-parser-2.2.2.tgz | Upgrade to version: socket.io-parser - 3.3.2,3.4.1 | #53 |
CVE-2020-36048Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ engine.io-1.5.4.tgz (Vulnerable Library) |
High | 7.5 | engine.io-1.5.4.tgz | Upgrade to version: engine.io - 4.0.0 | #52 |
CVE-2017-20165Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/socket.io-parser/node_modules/debug/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-parser/node_modules/debug/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-client/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-parser-2.2.4.tgz -> ❌ debug-0.7.4.tgz (Vulnerable Library) |
High | 7.5 | debug-0.7.4.tgz | Upgrade to version: debug - 2.6.9,3.1.0 | #88 |
CVE-2017-20165Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ debug-2.1.0.tgz (Vulnerable Library) |
High | 7.5 | debug-2.1.0.tgz | Upgrade to version: debug - 2.6.9,3.1.0 | #88 |
CVE-2017-20165Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ debug-1.0.3.tgz (Vulnerable Library) |
High | 7.5 | debug-1.0.3.tgz | Upgrade to version: debug - 2.6.9,3.1.0 | #88 |
CVE-2017-20165Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-adapter-0.3.1.tgz -> ❌ debug-1.0.2.tgz (Vulnerable Library) |
High | 7.5 | debug-1.0.2.tgz | Upgrade to version: debug - 2.6.9,3.1.0 | #88 |
CVE-2017-20165Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io-client/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-client-1.3.7.tgz -> engine.io-client-1.5.4.tgz -> ❌ debug-1.0.4.tgz (Vulnerable Library) |
High | 7.5 | debug-1.0.4.tgz | Upgrade to version: debug - 2.6.9,3.1.0 | #88 |
CVE-2017-16113Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/parsejson/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-client-1.3.7.tgz -> engine.io-client-1.5.4.tgz -> ❌ parsejson-0.0.1.tgz (Vulnerable Library) |
High | 7.5 | parsejson-0.0.1.tgz | #14 | |
CVE-2017-1000048Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/qs/package.json Dependency Hierarchy: -> express-4.13.4.tgz (Root Library) -> ❌ qs-4.0.0.tgz (Vulnerable Library) |
High | 7.5 | qs-4.0.0.tgz | Upgrade to version: qs - 6.0.4,6.1.2,6.2.3,6.3.2 | #10 |
CVE-2016-10542Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/ws/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ ws-0.8.0.tgz (Vulnerable Library) |
High | 7.5 | ws-0.8.0.tgz | Upgrade to version: v2.4.24 | None |
CVE-2016-10539Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/negotiator/package.json Dependency Hierarchy: -> express-4.13.4.tgz (Root Library) -> accepts-1.2.13.tgz -> ❌ negotiator-0.5.3.tgz (Vulnerable Library) |
High | 7.5 | negotiator-0.5.3.tgz | Upgrade to version: 0.6.1 | None |
CVE-2016-10518Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/ws/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ ws-0.8.0.tgz (Vulnerable Library) |
High | 7.5 | ws-0.8.0.tgz | Upgrade to version: 1.0.0 | None |
CVE-2015-8315Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/engine.io-client/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/ms/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> debug-1.0.3.tgz -> ❌ ms-0.6.2.tgz (Vulnerable Library) |
High | 7.5 | ms-0.6.2.tgz | Upgrade to version: 0.7.1 | None |
WS-2017-0107Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/ws/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ ws-0.8.0.tgz (Vulnerable Library) |
High | 7.4 | ws-0.8.0.tgz | Upgrade to version: 2.0.0-beta.0 | None |
CVE-2020-8203Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
High | 7.4 | lodash-2.4.2.tgz | Upgrade to version: lodash - 4.17.19 | #19 |
CVE-2021-23337Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
High | 7.2 | lodash-2.4.2.tgz | Upgrade to version: lodash - 4.17.21, lodash-es - 4.17.21 | #42 |
CVE-2022-41940Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ engine.io-1.5.4.tgz (Vulnerable Library) |
Medium | 6.5 | engine.io-1.5.4.tgz | Upgrade to version: engine.io - 3.6.1,6.2.1 | #75 |
CVE-2019-1010266Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
Medium | 6.5 | lodash-2.4.2.tgz | Upgrade to version: lodash-4.17.11 | #25 |
CVE-2018-3721Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
Medium | 6.5 | lodash-2.4.2.tgz | Upgrade to version: lodash 4.17.5 | #38 |
CVE-2024-29041Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/express/package.json Dependency Hierarchy: -> ❌ express-4.13.4.tgz (Vulnerable Library) |
Medium | 6.1 | express-4.13.4.tgz | Upgrade to version: express - 4.19.0 | #98 |
CVE-2016-10536Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io-client/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-client-1.3.7.tgz -> ❌ engine.io-client-1.5.4.tgz (Vulnerable Library) |
Medium | 5.9 | engine.io-client-1.5.4.tgz | Upgrade to version: JetBrains.Rider.Frontend5 - 213.0.20211008.154703-eap03;engine.io-client - 1.6.9 | None |
CVE-2018-16487Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
Medium | 5.6 | lodash-2.4.2.tgz | Upgrade to version: lodash 4.17.11 | #24 |
CVE-2020-28500Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/lodash/package.json Dependency Hierarchy: -> grunt-cli-0.1.13.tgz (Root Library) -> findup-sync-0.1.3.tgz -> ❌ lodash-2.4.2.tgz (Vulnerable Library) |
Medium | 5.3 | lodash-2.4.2.tgz | Upgrade to version: lodash - 4.17.21 | #49 |
CVE-2017-20162Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/engine.io-client/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/node_modules/ms/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/ms/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> debug-1.0.3.tgz -> ❌ ms-0.6.2.tgz (Vulnerable Library) |
Medium | 5.3 | ms-0.6.2.tgz | Upgrade to version: ms - 2.0.0 | #78 |
CVE-2020-28481Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/package.json Dependency Hierarchy: -> ❌ socket.io-1.3.7.tgz (Vulnerable Library) |
Medium | 4.3 | socket.io-1.3.7.tgz | Upgrade to version: 2.4.0 | #40 |
CVE-2017-16137Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/socket.io-parser/node_modules/debug/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-parser/node_modules/debug/package.json,/assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-client/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-parser-2.2.4.tgz -> ❌ debug-0.7.4.tgz (Vulnerable Library) |
Low | 3.7 | debug-0.7.4.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #16 |
CVE-2017-16137Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> ❌ debug-2.1.0.tgz (Vulnerable Library) |
Low | 3.7 | debug-2.1.0.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #16 |
CVE-2017-16137Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> engine.io-1.5.4.tgz -> ❌ debug-1.0.3.tgz (Vulnerable Library) |
Low | 3.7 | debug-1.0.3.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #16 |
CVE-2017-16137Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/socket.io-adapter/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-adapter-0.3.1.tgz -> ❌ debug-1.0.2.tgz (Vulnerable Library) |
Low | 3.7 | debug-1.0.2.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #16 |
CVE-2017-16137Path to dependency file: /assets/wmt/reveal/plugin/multiplex/package.json Path to vulnerable library: /assets/wmt/reveal/plugin/multiplex/node_modules/engine.io-client/node_modules/debug/package.json Dependency Hierarchy: -> socket.io-1.3.7.tgz (Root Library) -> socket.io-client-1.3.7.tgz -> engine.io-client-1.5.4.tgz -> ❌ debug-1.0.4.tgz (Vulnerable Library) |
Low | 3.7 | debug-1.0.4.tgz | Upgrade to version: debug - 2.6.9,3.1.0,3.2.7,4.3.1 | #16 |
✔️ Remediated vulnerabilities:
CVE | Vulnerable Library |
---|---|
CVE-2021-23413 | jszip-2.5.0.tgz |
CVE-2016-10540 | minimatch-2.0.10.tgz |
CVE-2018-3721 | lodash-3.10.1.tgz |
CVE-2022-2421 | socket.io-parser-2.3.1.tgz |
WS-2018-0590 | diff-1.3.2.tgz |
CVE-2019-10744 | lodash-3.7.0.tgz |
CVE-2019-1010266 | lodash-3.7.0.tgz |
CVE-2020-28500 | lodash-4.17.20.tgz |
CVE-2016-1000232 | tough-cookie-2.2.2.tgz |
CVE-2020-36049 | socket.io-parser-2.3.1.tgz |
CVE-2017-16026 | request-2.67.0.tgz |
CVE-2022-3517 | minimatch-2.0.10.tgz |
CVE-2022-24999 | qs-5.1.0.tgz |
CVE-2015-9251 | jquery-1.7.2.min.js |
CVE-2020-36048 | engine.io-1.8.5.tgz |
CVE-2022-24999 | qs-6.5.2.tgz |
CVE-2019-11358 | jquery-1.7.2.min.js |
CVE-2020-28500 | lodash-3.10.1.tgz |
CVE-2021-43138 | async-2.6.3.tgz |
WS-2019-0425 | mocha-1.21.5.js |
CVE-2022-25883 | semver-5.7.1.tgz |
CVE-2018-1000620 | cryptiles-2.0.5.tgz |
CVE-2020-8244 | bl-1.0.3.tgz |
CVE-2021-33623 | trim-newlines-1.0.0.tgz |
CVE-2021-23343 | path-parse-1.0.6.tgz |
CVE-2017-1000048 | qs-5.2.1.tgz |
CVE-2020-28500 | lodash-3.7.0.tgz |
CVE-2022-24999 | qs-5.2.0.tgz |
CVE-2024-29041 | express-4.14.1.tgz |
WS-2020-0443 | socket.io-1.7.4.tgz |
CVE-2018-3721 | lodash-3.7.0.tgz |
CVE-2020-28282 | getobject-0.1.0.tgz |
CVE-2022-29167 | hawk-3.1.3.tgz |
WS-2019-0017 | clean-css-3.4.28.tgz |
CVE-2023-28155 | request-2.67.0.tgz |
CVE-2019-10744 | lodash-3.10.1.tgz |
CVE-2021-44906 | minimist-1.2.5.tgz |
CVE-2021-23807 | jsonpointer-4.1.0.tgz |
CVE-2020-28502 | xmlhttprequest-ssl-1.5.3.tgz |
CVE-2012-6708 | jquery-1.7.2.min.js |
CVE-2019-1010266 | lodash-3.10.1.tgz |
CVE-2022-41940 | engine.io-1.8.5.tgz |
CVE-2017-1000048 | qs-6.2.0.tgz |
WS-2018-0076 | tunnel-agent-0.4.3.tgz |
CVE-2022-0436 | grunt-1.0.4.tgz |
CVE-2021-23337 | lodash-3.10.1.tgz |
CVE-2016-10538 | cli-0.6.6.tgz |
CVE-2020-8203 | lodash-3.7.0.tgz |
CVE-2021-23382 | postcss-4.1.16.tgz |
CVE-2020-11022 | jquery-1.7.2.min.js |
WS-2016-0036 | cli-0.6.6.tgz |
CVE-2017-20162 | ms-0.7.2.tgz |
CVE-2017-1000048 | qs-5.1.0.tgz |
CVE-2022-1537 | grunt-1.0.4.tgz |
CVE-2022-24999 | qs-6.2.0.tgz |
CVE-2023-26136 | tough-cookie-2.5.0.tgz |
CVE-2017-16137 | debug-2.3.3.tgz |
CVE-2021-23362 | hosted-git-info-2.8.8.tgz |
CVE-2020-7729 | grunt-1.0.4.tgz |
CVE-2024-38355 | socket.io-1.7.4.tgz |
CVE-2017-20165 | debug-2.3.3.tgz |
CVE-2021-23337 | lodash-4.17.20.tgz |
CVE-2023-26136 | tough-cookie-2.2.2.tgz |
CVE-2017-1000048 | qs-5.2.0.tgz |
CVE-2017-16113 | parsejson-0.0.3.tgz |
CVE-2018-16487 | lodash-3.10.1.tgz |
CVE-2021-23358 | underscore-1.8.3.tgz |
CVE-2020-7656 | jquery-1.7.2.min.js |
CVE-2021-23337 | lodash-3.7.0.tgz |
CVE-2018-3728 | hoek-2.16.3.tgz |
CVE-2020-8203 | lodash-3.10.1.tgz |
CVE-2021-31597 | xmlhttprequest-ssl-1.5.3.tgz |
CVE-2018-16487 | lodash-3.7.0.tgz |
CVE-2017-15010 | tough-cookie-2.2.2.tgz |
CVE-2020-11023 | jquery-1.7.2.min.js |
CVE-2022-0144 | shelljs-0.3.0.tgz |
CVE-2020-28481 | socket.io-1.7.4.tgz |
CVE-2022-48285 | jszip-2.5.0.tgz |
CVE-2022-3517 | minimatch-3.0.4.tgz |
CVE-2023-28155 | request-2.88.2.tgz |
CVE-2022-24999 | qs-5.2.1.tgz |
Base branch total remaining vulnerabilities: 112
Base branch commit: null
Total libraries scanned: 145
Scan token: cfbe059eba4b4ebd98bfda880ffaa659