In Dependencies We Trust: How vulnerable are dependencies in software modules?