We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Severity Threshold: π΅ MEDIUM
ID: 01JE5DH5DEKE6QNJ75J09JT7TF Package: lodash Version: 4.17.4 Vulnerabilities: 7 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75J09JT7TF
Package: lodash
Version: 4.17.4
Vulnerabilities: 7
Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HYZ7GEHC Package: lodash Version: 3.10.1 Vulnerabilities: 7 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HYZ7GEHC
Version: 3.10.1
ID: 01JE5DH5DEKE6QNJ75HWY9Q95X Package: json-schema Version: 0.2.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HWY9Q95X
Package: json-schema
Version: 0.2.3
Vulnerabilities: 1
ID: 01JE5DH5DEKE6QNJ75J2WST7JN Package: node-forge Version: 0.7.1 Vulnerabilities: 5 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75J2WST7JN
Package: node-forge
Version: 0.7.1
Vulnerabilities: 5
node-forge
ID: 01JE5DH5DEKE6QNJ75HSNJPKHJ Package: hoek Version: 2.16.3 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HSNJPKHJ
Package: hoek
Version: 2.16.3
Vulnerabilities: 2
ID: 01JE5DH5DEKE6QNJ75JEMB4RG6 Package: tough-cookie Version: 2.3.2 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75JEMB4RG6
Package: tough-cookie
Version: 2.3.2
ID: 01JE5DH5DEKE6QNJ75HE1MZB12 Package: async Version: 2.5.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HE1MZB12
Package: async
Version: 2.5.0
ID: 01JE5DH5DEKE6QNJ75HKDAWVWC Package: dot-prop Version: 4.2.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HKDAWVWC
Package: dot-prop
Version: 4.2.0
ID: 01JE5DH5DEKE6QNJ75HRE4BBCK Package: hawk Version: 3.1.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HRE4BBCK
Package: hawk
Version: 3.1.3
ID: 01JE5DH5DEKE6QNJ75J131NPKS Package: mime Version: 1.4.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75J131NPKS
Package: mime
Version: 1.4.0
ID: 01JE5DH5DEKE6QNJ75J5V4RSMK Package: qs Version: 6.4.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75J5V4RSMK
Package: qs
Version: 6.4.0
ID: 01JE5DH5DEKE6QNJ75JDHQEDXS Package: sshpk Version: 1.13.1 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75JDHQEDXS
Package: sshpk
Version: 1.13.1
ID: 01JE5DH5DEKE6QNJ75HATQNZ9W Package: ajv Version: 4.11.8 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HATQNZ9W
Package: ajv
Version: 4.11.8
ID: 01JE5DH5DEKE6QNJ75HH3WTA42 Package: base64url Version: 2.0.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HH3WTA42
Package: base64url
Version: 2.0.0
ID: 01JE5DH5DEKE6QNJ75HMYNQ75W Package: extend Version: 3.0.1 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75HMYNQ75W
Package: extend
Version: 3.0.1
ID: 01JE5DH5DEKE6QNJ75J9NNESNA Package: request Version: 2.81.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75J9NNESNA
Package: request
Version: 2.81.0
ID: 01JE5DH5DEKE6QNJ75JEFXC4QQ Package: stringstream Version: 0.0.5 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75JEFXC4QQ
Package: stringstream
Version: 0.0.5
ID: 01JE5DH5DEKE6QNJ75FJS0W1CQ Package: handlebars Version: 4.0.6 Vulnerabilities: 10 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FJS0W1CQ
Package: handlebars
Version: 4.0.6
Vulnerabilities: 10
ID: 01JE5DH5DEKE6QNJ75FYXCMB6M Package: lodash Version: 4.9.0 Vulnerabilities: 7 Type: Direct
ID: 01JE5DH5DEKE6QNJ75FYXCMB6M
Version: 4.9.0
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 40 in 16064b1
ID: 01JE5DH5DEKE6QNJ75FY03KG4H Package: lodash Version: 3.7.0 Vulnerabilities: 7 Type: Direct
ID: 01JE5DH5DEKE6QNJ75FY03KG4H
Version: 3.7.0
ID: 01JE5DH5DEKE6QNJ75GAT24WMW Package: minimist Version: 1.2.0 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GAT24WMW
Package: minimist
Version: 1.2.0
ID: 01JE5DH5DEKE6QNJ75G79BKA1Q Package: minimist Version: 0.0.8 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75G79BKA1Q
Version: 0.0.8
ID: 01JE5DH5DEKE6QNJ75FFWH0YXW Package: growl Version: 1.9.2 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FFWH0YXW
Package: growl
Version: 1.9.2
ID: 01JE5DH5DEKE6QNJ75FQPXKKJW Package: json-schema Version: 0.2.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FQPXKKJW
ID: 01JE5DH5DEKE6QNJ75H6Z77YP6 Package: underscore Version: 1.8.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75H6Z77YP6
Package: underscore
Version: 1.8.3
ID: 01JE5DH5DEKE6QNJ75H3GFBCSX Package: underscore Version: 1.6.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75H3GFBCSX
Version: 1.6.0
ID: 01JE5DH5DEKE6QNJ75GDDK0YXP Package: node-forge Version: 0.6.46 Vulnerabilities: 5 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GDDK0YXP
Version: 0.6.46
ID: 01JE5DH5DEKE6QNJ75G0279WBP Package: marked Version: 0.3.6 Vulnerabilities: 4 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75G0279WBP
Package: marked
Version: 0.3.6
Vulnerabilities: 4
ID: 01JE5DH5DEKE6QNJ75FP5BMDPC Package: hoek Version: 2.16.3 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FP5BMDPC
ID: 01JE5DH5DEKE6QNJ75GFQXAX13 Package: qs Version: 6.2.1 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GFQXAX13
Version: 6.2.1
ID: 01JE5DH5DEKE6QNJ75GK3454D6 Package: qs Version: 6.3.0 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GK3454D6
Version: 6.3.0
ID: 01JE5DH5DEKE6QNJ75FPZPARZB Package: is-my-json-valid Version: 2.15.0 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FPZPARZB
Package: is-my-json-valid
Version: 2.15.0
ID: 01JE5DH5DEKE6QNJ75FQ4884J4 Package: js-yaml Version: 3.6.1 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FQ4884J4
Package: js-yaml
Version: 3.6.1
ID: 01JE5DH5DEKE6QNJ75GWHA6R5C Package: shelljs Version: 0.3.0 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GWHA6R5C
Package: shelljs
Version: 0.3.0
ID: 01JE5DH5DEKE6QNJ75H1TMR9N0 Package: tough-cookie Version: 2.3.2 Vulnerabilities: 2 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75H1TMR9N0
ID: 01JE5DH5DEKE6QNJ75F56DT3PR Package: brace-expansion Version: 1.1.6 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75F56DT3PR
Package: brace-expansion
Version: 1.1.6
ID: 01JE5DH5DEKE6QNJ75F7BNAW52 Package: debug Version: 2.2.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75F7BNAW52
Package: debug
Version: 2.2.0
ID: 01JE5DH5DEKE6QNJ75FA05K5F7 Package: diff Version: 1.4.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FA05K5F7
Package: diff
ID: 01JE5DH5DEKE6QNJ75FMM2DRX3 Package: hawk Version: 3.1.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FMM2DRX3
ID: 01JE5DH5DEKE6QNJ75FT8P5YDS Package: keypair Version: 1.0.0 Vulnerabilities: 1 Type: Direct
ID: 01JE5DH5DEKE6QNJ75FT8P5YDS
Package: keypair
Version: 1.0.0
Line 50 in 16064b1
ID: 01JE5DH5DEKE6QNJ75G1XK1PCG Package: mime Version: 1.3.4 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75G1XK1PCG
Version: 1.3.4
ID: 01JE5DH5DEKE6QNJ75G5D90S5M Package: minimatch Version: 3.0.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75G5D90S5M
Package: minimatch
Version: 3.0.3
ID: 01JE5DH5DEKE6QNJ75GZ0T3WV3 Package: sshpk Version: 1.10.1 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GZ0T3WV3
Version: 1.10.1
ID: 01JE5DH5DEKE6QNJ75GZPK1B2T Package: taffydb Version: 2.6.2 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GZPK1B2T
Package: taffydb
Version: 2.6.2
ID: 01JE5DH5DEKE6QNJ75F1B02EZ8 Package: base64url Version: 2.0.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75F1B02EZ8
ID: 01JE5DH5DEKE6QNJ75F4RVDCS7 Package: bl Version: 1.1.2 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75F4RVDCS7
Package: bl
Version: 1.1.2
ID: 01JE5DH5DEKE6QNJ75FCC3C00G Package: extend Version: 3.0.0 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FCC3C00G
Version: 3.0.0
ID: 01JE5DH5DEKE6QNJ75FS0CDWSC Package: jsonpointer Version: 4.0.1 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75FS0CDWSC
Package: jsonpointer
Version: 4.0.1
ID: 01JE5DH5DEKE6QNJ75GBR97N1N Package: ms Version: 0.7.1 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GBR97N1N
Package: ms
ID: 01JE5DH5DEKE6QNJ75GTF7ZRB5 Package: request Version: 2.79.0 Vulnerabilities: 1 Type: Direct
ID: 01JE5DH5DEKE6QNJ75GTF7ZRB5
Version: 2.79.0
Line 8 in 16064b1
ID: 01JE5DH5DEKE6QNJ75GPKJ8V21 Package: request Version: 2.75.0 Vulnerabilities: 1 Type: Direct
ID: 01JE5DH5DEKE6QNJ75GPKJ8V21
Version: 2.75.0
ID: 01JE5DH5DEKE6QNJ75GZGJJ1FF Package: stringstream Version: 0.0.5 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75GZGJJ1FF
ID: 01JE5DH5DEKE6QNJ75H25HCJ5X Package: tunnel-agent Version: 0.4.3 Vulnerabilities: 1 Type: Transitive
ID: 01JE5DH5DEKE6QNJ75H25HCJ5X
Package: tunnel-agent
Version: 0.4.3
Reply with /nullify to interact with me like another developer
/nullify
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Severity Threshold: π΅ MEDIUM
Repository Summary
package-lock.json
ID: 01JE5DH5DEKE6QNJ75J09JT7TF
Package: lodash
Version: 4.17.4
Vulnerabilities: 7
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HYZ7GEHC
Package: lodash
Version: 3.10.1
Vulnerabilities: 7
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HWY9Q95X
Package: json-schema
Version: 0.2.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75J2WST7JN
Package: node-forge
Version: 0.7.1
Vulnerabilities: 5
Type: Transitive
View Vulnerabilities (CVEs)
node-forge
ID: 01JE5DH5DEKE6QNJ75HSNJPKHJ
Package: hoek
Version: 2.16.3
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75JEMB4RG6
Package: tough-cookie
Version: 2.3.2
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HE1MZB12
Package: async
Version: 2.5.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HKDAWVWC
Package: dot-prop
Version: 4.2.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HRE4BBCK
Package: hawk
Version: 3.1.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75J131NPKS
Package: mime
Version: 1.4.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75J5V4RSMK
Package: qs
Version: 6.4.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75JDHQEDXS
Package: sshpk
Version: 1.13.1
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HATQNZ9W
Package: ajv
Version: 4.11.8
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HH3WTA42
Package: base64url
Version: 2.0.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75HMYNQ75W
Package: extend
Version: 3.0.1
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75J9NNESNA
Package: request
Version: 2.81.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75JEFXC4QQ
Package: stringstream
Version: 0.0.5
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
package.json
ID: 01JE5DH5DEKE6QNJ75FJS0W1CQ
Package: handlebars
Version: 4.0.6
Vulnerabilities: 10
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FYXCMB6M
Package: lodash
Version: 4.9.0
Vulnerabilities: 7
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 40 in 16064b1
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FY03KG4H
Package: lodash
Version: 3.7.0
Vulnerabilities: 7
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 40 in 16064b1
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GAT24WMW
Package: minimist
Version: 1.2.0
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75G79BKA1Q
Package: minimist
Version: 0.0.8
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FFWH0YXW
Package: growl
Version: 1.9.2
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FQPXKKJW
Package: json-schema
Version: 0.2.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75H6Z77YP6
Package: underscore
Version: 1.8.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75H3GFBCSX
Package: underscore
Version: 1.6.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GDDK0YXP
Package: node-forge
Version: 0.6.46
Vulnerabilities: 5
Type: Transitive
View Vulnerabilities (CVEs)
node-forge
ID: 01JE5DH5DEKE6QNJ75G0279WBP
Package: marked
Version: 0.3.6
Vulnerabilities: 4
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FP5BMDPC
Package: hoek
Version: 2.16.3
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GFQXAX13
Package: qs
Version: 6.2.1
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GK3454D6
Package: qs
Version: 6.3.0
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FPZPARZB
Package: is-my-json-valid
Version: 2.15.0
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FQ4884J4
Package: js-yaml
Version: 3.6.1
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GWHA6R5C
Package: shelljs
Version: 0.3.0
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75H1TMR9N0
Package: tough-cookie
Version: 2.3.2
Vulnerabilities: 2
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75F56DT3PR
Package: brace-expansion
Version: 1.1.6
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75F7BNAW52
Package: debug
Version: 2.2.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FA05K5F7
Package: diff
Version: 1.4.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FMM2DRX3
Package: hawk
Version: 3.1.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FT8P5YDS
Package: keypair
Version: 1.0.0
Vulnerabilities: 1
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 50 in 16064b1
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75G1XK1PCG
Package: mime
Version: 1.3.4
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75G5D90S5M
Package: minimatch
Version: 3.0.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GZ0T3WV3
Package: sshpk
Version: 1.10.1
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GZPK1B2T
Package: taffydb
Version: 2.6.2
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75F1B02EZ8
Package: base64url
Version: 2.0.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75F4RVDCS7
Package: bl
Version: 1.1.2
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FCC3C00G
Package: extend
Version: 3.0.0
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75FS0CDWSC
Package: jsonpointer
Version: 4.0.1
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GBR97N1N
Package: ms
Version: 0.7.1
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GTF7ZRB5
Package: request
Version: 2.79.0
Vulnerabilities: 1
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 8 in 16064b1
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GPKJ8V21
Package: request
Version: 2.75.0
Vulnerabilities: 1
Type: Direct
cctv/node_modules/google-auth-library/package.json
Line 8 in 16064b1
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75GZGJJ1FF
Package: stringstream
Version: 0.0.5
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
ID: 01JE5DH5DEKE6QNJ75H25HCJ5X
Package: tunnel-agent
Version: 0.4.3
Vulnerabilities: 1
Type: Transitive
View Vulnerabilities (CVEs)
Reply with
/nullify
to interact with me like another developerThe text was updated successfully, but these errors were encountered: