diff --git a/qa/expect/gl-dependency-scanning-report.json b/qa/expect/gl-dependency-scanning-report.json
index ecd1f86d53c15c3e99e629ce851cb890e714216d..c77858e1d1cc4167337418874e950a582aa53f14 100644
--- a/qa/expect/gl-dependency-scanning-report.json
+++ b/qa/expect/gl-dependency-scanning-report.json
@@ -1524,7 +1524,7 @@
       "message": "Access of Resource Using Incompatible Type (Type Confusion) in nokogiri",
       "description": "Type confusion in `xsltNumberFormatGetMultipleLevel` in libxslt, which is included in nokogiri, could allow attackers to potentially exploit heap corruption via crafted XML data.",
       "cve": "Gemfile.lock:nokogiri:gemnasium:66bbb585-09a1-4042-bb63-e57e64568ded",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to version 1.2.0 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -1571,7 +1571,7 @@
       "message": "Improper Input Validation in nokogiri",
       "description": "In `numbers.c` in libxslt 1.1.33, which is used by nokogiri, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to `xsltNumberFormatDecimal`, leading to a read of uninitialized stack data.",
       "cve": "Gemfile.lock:nokogiri:gemnasium:e81fe131-f92b-4449-bc54-ca2baa35b06f",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to version 1.10.5 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -1612,7 +1612,7 @@
       "message": "Use After Free in nokogiri",
       "description": "In `xsltCopyText` in `transform.c` in libxslt, which is used by nokogiri, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.",
       "cve": "Gemfile.lock:nokogiri:gemnasium:ecf64d0e-4f5c-4ebe-9f3f-c75ea81dc837",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to version 1.10.5 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -1917,7 +1917,7 @@
       "message": "Denial of Service in axios",
       "description": "Axios allows attackers to cause a denial of service (application crash) by continuing to accepting content after `maxContentLength` is exceeded.",
       "cve": "yarn.lock:axios:gemnasium:b795b004-9d4a-49f2-a096-67b41809bf07",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to version 0.18.1 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2005,7 +2005,7 @@
       "message": "Arbitrary file overwrite in fstream",
       "description": "fstream is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The `fstream.DirWriter()` function is vulnerable.",
       "cve": "yarn.lock:fstream:gemnasium:cd3ac1e9-6caa-4405-9e55-a08d8fa74434",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to version 1.0.12 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2090,7 +2090,7 @@
       "message": "Regular Expression Denial of Service in hawk",
       "description": "Specifically crafted long headers or uris can cause a minor denial of service.",
       "cve": "yarn.lock:hawk:gemnasium:e33d0bab-2509-420f-950e-785c00309066",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Update to hawk version 4.1.1 or greater.",
       "scanner": {
         "id": "gemnasium",
@@ -2137,7 +2137,7 @@
       "message": "Prototype pollution attack in hoek",
       "description": "The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an unvalidated payload created from a JSON string containing the `__proto__` property.",
       "cve": "yarn.lock:hoek:gemnasium:ecfd31cc-df09-48ff-9f79-af1c4f989b49",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to latest version.",
       "scanner": {
         "id": "gemnasium",
@@ -2187,7 +2187,7 @@
       "message": "Prototype pollution attack in hoek",
       "description": "The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an unvalidated payload created from a JSON string containing the `__proto__` property.",
       "cve": "yarn.lock:hoek:gemnasium:ecfd31cc-df09-48ff-9f79-af1c4f989b49",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to latest version.",
       "scanner": {
         "id": "gemnasium",
@@ -2237,7 +2237,7 @@
       "message": "Prototype pollution attack in hoek",
       "description": "The `merge` function, and the `applyToDefaults` and `applyToDefaultsWithShallow` functions which leverage `merge` behind the scenes, are vulnerable to a prototype pollution attack when provided an unvalidated payload created from a JSON string containing the `__proto__` property.",
       "cve": "yarn.lock:hoek:gemnasium:ecfd31cc-df09-48ff-9f79-af1c4f989b49",
-      "severity": "Unknown",
+      "severity": "High",
       "solution": "Upgrade to latest version.",
       "scanner": {
         "id": "gemnasium",
@@ -2287,7 +2287,7 @@
       "message": "Uncontrolled Resource Consumption in lodash",
       "description": "lodash is affected by Uncontrolled Resource Consumption which can lead to a denial of service.",
       "cve": "yarn.lock:lodash:gemnasium:109f3b4c-bdb3-48be-b2f9-e0348fba64bd",
-      "severity": "Unknown",
+      "severity": "Medium",
       "solution": "Upgrade to version 4.17.11 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2331,7 +2331,7 @@
       "message": "Uncontrolled Resource Consumption in lodash",
       "description": "lodash is affected by Uncontrolled Resource Consumption which can lead to a denial of service.",
       "cve": "yarn.lock:lodash:gemnasium:109f3b4c-bdb3-48be-b2f9-e0348fba64bd",
-      "severity": "Unknown",
+      "severity": "Medium",
       "solution": "Upgrade to version 4.17.11 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2413,7 +2413,7 @@
       "message": "Improper Input Validation in lodash",
       "description": "lodash is vulnerable to Prototype Pollution. The function `defaultsDeep` could be tricked into adding or modifying properties of `Object.prototype` using a constructor payload.",
       "cve": "yarn.lock:lodash:gemnasium:4774cd67-936f-419e-8533-ae5cfe7db9f9",
-      "severity": "Unknown",
+      "severity": "Critical",
       "solution": "Upgrade to version 4.17.12 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2454,7 +2454,7 @@
       "message": "Improper Input Validation in lodash",
       "description": "lodash is vulnerable to Prototype Pollution. The function `defaultsDeep` could be tricked into adding or modifying properties of `Object.prototype` using a constructor payload.",
       "cve": "yarn.lock:lodash:gemnasium:4774cd67-936f-419e-8533-ae5cfe7db9f9",
-      "severity": "Unknown",
+      "severity": "Critical",
       "solution": "Upgrade to version 4.17.12 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2533,7 +2533,7 @@
       "message": "Argument Injection or Modification in mixin-deep",
       "description": "mixin-deep is vulnerable to Prototype Pollution. The function mixin-deep could be tricked into adding or modifying properties of `Object.prototype` using a constructor payload.",
       "cve": "yarn.lock:mixin-deep:gemnasium:04af00f2-3b09-4656-9f4b-bcb2f4ef3db1",
-      "severity": "Unknown",
+      "severity": "Critical",
       "solution": "Upgrade to versions 1.3.2, 2.0.1 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2612,7 +2612,7 @@
       "message": "Cross-site Scripting in serialize-javascript",
       "description": "The serialize-javascript npm package is vulnerable to Cross-site Scripting (XSS). It does not properly mitigate against unsafe characters in serialized regular expressions. If serialized data of regular expression objects are used in an environment other than Node.js, it is affected by this vulnerability.",
       "cve": "yarn.lock:serialize-javascript:gemnasium:58caa017-9a9a-46d6-bab2-ec930f46833c",
-      "severity": "Unknown",
+      "severity": "Medium",
       "solution": "Upgrade to version 2.1.1 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2653,7 +2653,7 @@
       "message": "Uncontrolled Resource Consumption in set-value",
       "description": "set-value is vulnerable to Prototype Pollution. The function `mixin-deep` could be tricked into adding or modifying properties of `Object.prototype` using any of the constructor, prototype and `_proto_` payloads.",
       "cve": "yarn.lock:set-value:gemnasium:6f541fe7-9711-457a-8003-a52d8650b66f",
-      "severity": "Unknown",
+      "severity": "Critical",
       "solution": "Upgrade to versions 2.0.1, 3.0.1 or above.",
       "scanner": {
         "id": "gemnasium",
@@ -2694,7 +2694,7 @@
       "message": "Uncontrolled Resource Consumption in set-value",
       "description": "set-value is vulnerable to Prototype Pollution. The function `mixin-deep` could be tricked into adding or modifying properties of `Object.prototype` using any of the constructor, prototype and `_proto_` payloads.",
       "cve": "yarn.lock:set-value:gemnasium:6f541fe7-9711-457a-8003-a52d8650b66f",
-      "severity": "Unknown",
+      "severity": "Critical",
       "solution": "Upgrade to versions 2.0.1, 3.0.1 or above.",
       "scanner": {
         "id": "gemnasium",