This repository has been archived by the owner on Dec 20, 2023. It is now read-only.
Update dependency draft-js to >=0.11.7 (master) #23
Appcues WSS / WhiteSource Security Check
succeeded
Dec 7, 2023 in 2m 28s
Security Report
✔️ 👍 Way to go! You have successfully remediated 122 vulnerabilities in this branch:
CVE | Vulnerable Library |
---|---|
CVE-2017-20165 | debug-2.2.0.tgz |
CVE-2021-23369 | handlebars-4.0.6.tgz |
CVE-2017-15010 | tough-cookie-2.3.2.tgz |
CVE-2018-3721 | lodash-3.10.1.tgz |
CVE-2018-16492 | extend-3.0.0.tgz |
CVE-2022-2421 | socket.io-parser-2.3.1.tgz |
CVE-2020-28481 | socket.io-1.7.2.tgz |
CVE-2018-3750 | deep-extend-0.4.1.tgz |
CVE-2021-23495 | karma-0.13.22.tgz |
CVE-2018-21270 | stringstream-0.0.5.tgz |
CVE-2017-20165 | debug-2.6.1.tgz |
CVE-2020-36049 | socket.io-parser-2.3.1.tgz |
CVE-2020-7789 | node-notifier-4.6.1.tgz |
CVE-2018-3737 | sshpk-1.10.2.tgz |
WS-2019-0103 | handlebars-4.0.6.tgz |
CVE-2017-1000048 | qs-6.2.1.tgz |
CVE-2022-21681 | marked-0.3.6.tgz |
CVE-2019-20920 | handlebars-4.0.6.tgz |
WS-2020-0450 | handlebars-4.0.6.tgz |
CVE-2020-15168 | node-fetch-1.6.3.tgz |
CVE-2021-23337 | lodash-4.17.4.tgz |
CVE-2023-28155 | request-2.79.0.tgz |
WS-2019-0063 | js-yaml-3.8.1.tgz |
CVE-2017-16137 | debug-2.6.0.tgz |
CVE-2020-7608 | yargs-parser-4.2.1.tgz |
WS-2019-0032 | js-yaml-3.8.1.tgz |
CVE-2017-1000048 | qs-6.3.0.tgz |
CVE-2021-37713 | tar-2.2.1.tgz |
CVE-2022-24999 | qs-6.2.1.tgz |
CVE-2021-3918 | json-schema-0.2.3.tgz |
CVE-2017-16028 | randomatic-1.1.6.tgz |
WS-2020-0344 | is-my-json-valid-2.15.0.tgz |
CVE-2017-16032 | brace-expansion-1.1.6.tgz |
CVE-2020-28500 | lodash-3.10.1.tgz |
CVE-2018-1107 | is-my-json-valid-2.15.0.tgz |
CVE-2018-1000620 | cryptiles-2.0.5.tgz |
CVE-2022-0235 | node-fetch-1.6.3.tgz |
CVE-2019-10744 | lodash-4.17.4.tgz |
CVE-2022-0437 | karma-0.13.22.tgz |
CVE-2018-20834 | tar-2.2.1.tgz |
CVE-2020-28499 | merge-1.2.0.tgz |
CVE-2020-28500 | lodash-4.17.4.tgz |
CVE-2021-23807 | jsonpointer-4.0.1.tgz |
CVE-2020-28469 | glob-parent-2.0.0.tgz |
WS-2020-0443 | socket.io-1.7.2.tgz |
CVE-2022-3517 | minimatch-3.0.3.tgz |
CVE-2021-3777 | tmpl-1.0.4.tgz |
WS-2017-3757 | content-type-parser-1.0.1.tgz |
CVE-2017-16114 | marked-0.3.6.tgz |
CVE-2021-32804 | tar-2.2.1.tgz |
CVE-2019-20922 | handlebars-4.0.6.tgz |
CVE-2022-29167 | hawk-3.1.3.tgz |
CVE-2021-37712 | tar-2.2.1.tgz |
WS-2018-0347 | eslint-3.12.0.tgz |
WS-2020-0163 | marked-0.3.6.tgz |
CVE-2022-25883 | semver-5.3.0.tgz |
CVE-2023-45311 | fsevents-1.0.17.tgz |
CVE-2019-10744 | lodash-3.10.1.tgz |
CVE-2022-21704 | log4js-0.6.38.tgz |
CVE-2022-0144 | shelljs-0.7.6.tgz |
CVE-2020-28502 | xmlhttprequest-ssl-1.5.3.tgz |
CVE-2021-23383 | handlebars-4.0.6.tgz |
CVE-2019-1010266 | lodash-3.10.1.tgz |
WS-2017-0421 | ws-1.1.1.tgz |
CVE-2020-7598 | minimist-1.2.0.tgz |
CVE-2017-20165 | debug-2.6.0.tgz |
CVE-2017-16137 | debug-2.2.0.tgz |
WS-2018-0650 | useragent-2.1.12.tgz |
WS-2018-0076 | tunnel-agent-0.4.3.tgz |
WS-2019-0025 | marked-0.3.6.tgz |
CVE-2022-46175 | json5-0.5.1.tgz |
CVE-2022-21680 | marked-0.3.6.tgz |
CVE-2021-23337 | lodash-3.10.1.tgz |
CVE-2021-32803 | tar-2.2.1.tgz |
CVE-2017-1000427 | marked-0.3.6.tgz |
CVE-2017-16138 | mime-1.3.4.tgz |
CVE-2020-7788 | ini-1.3.4.tgz |
CVE-2021-43138 | async-2.1.4.tgz |
CVE-2017-16137 | debug-2.6.1.tgz |
CVE-2017-20162 | ms-0.7.2.tgz |
CVE-2021-23362 | hosted-git-info-2.2.0.tgz |
WS-2018-0589 | nwmatcher-1.3.9.tgz |
CVE-2020-36048 | engine.io-1.8.2.tgz |
WS-2019-0064 | handlebars-4.0.6.tgz |
CVE-2017-18077 | brace-expansion-1.1.6.tgz |
WS-2018-0069 | is-my-json-valid-2.15.0.tgz |
CVE-2018-16487 | lodash-4.17.4.tgz |
WS-2019-0027 | marked-0.3.6.tgz |
CVE-2017-16137 | debug-2.3.3.tgz |
CVE-2019-19919 | handlebars-4.0.6.tgz |
CVE-2020-15366 | ajv-4.11.2.tgz |
WS-2018-0590 | diff-3.2.0.tgz |
CVE-2020-7774 | y18n-3.2.1.tgz |
WS-2017-0107 | ws-1.1.1.tgz |
CVE-2021-44906 | minimist-1.2.0.tgz |
CVE-2018-16469 | merge-1.2.0.tgz |
CVE-2017-20165 | debug-2.3.3.tgz |
MSC-2023-16611 | fsevents-1.0.17.tgz |
CVE-2020-8203 | lodash-4.17.4.tgz |
CVE-2020-7733 | ua-parser-js-0.7.12.tgz |
CVE-2021-23343 | path-parse-1.0.5.tgz |
CVE-2017-16113 | parsejson-0.0.3.tgz |
WS-2020-0345 | jsonpointer-4.0.1.tgz |
CVE-2018-16487 | lodash-3.10.1.tgz |
CVE-2018-3721 | lodash-4.17.4.tgz |
CVE-2019-1010266 | lodash-4.17.4.tgz |
CVE-2022-24999 | qs-6.3.0.tgz |
WS-2018-0628 | marked-0.3.6.tgz |
WS-2020-0091 | http-proxy-1.16.2.tgz |
WS-2018-0103 | stringstream-0.0.5.tgz |
CVE-2020-8203 | lodash-3.10.1.tgz |
CVE-2018-3728 | hoek-2.16.3.tgz |
WS-2020-0342 | is-my-json-valid-2.15.0.tgz |
CVE-2021-31597 | xmlhttprequest-ssl-1.5.3.tgz |
CVE-2023-26136 | tough-cookie-2.3.2.tgz |
CVE-2019-13173 | fstream-1.0.10.tgz |
WS-2019-0026 | marked-0.3.6.tgz |
CVE-2021-37701 | tar-2.2.1.tgz |
CVE-2022-41940 | engine.io-1.8.2.tgz |
CVE-2020-7793 | ua-parser-js-0.7.12.tgz |
CVE-2022-25927 | ua-parser-js-0.7.31.tgz |
CVE-2022-37601 | loader-utils-0.2.16.tgz |
Base branch total remaining vulnerabilities: 122
Base branch commit: null
Total libraries scanned: 4
Scan token: 660061f7e1b2480897b66cd848b7fa3d
Loading