Vulnerabilities | |||||
---|---|---|---|---|---|
Version | Suggest | Low | Medium | High | Critical |
5.0.4 | 0 | 0 | 0 | 0 | 0 |
5.0.2 | 0 | 0 | 0 | 0 | 0 |
5.0.0 | 0 | 0 | 0 | 0 | 0 |
4.0.4 | 0 | 0 | 0 | 0 | 0 |
4.0.3 | 0 | 0 | 0 | 0 | 0 |
4.0.2 | 0 | 0 | 0 | 0 | 0 |
4.0.1 | 0 | 0 | 0 | 0 | 0 |
4.0.0 | 0 | 0 | 0 | 0 | 0 |
3.0.27 | 0 | 0 | 0 | 0 | 0 |
3.0.26 | 0 | 0 | 0 | 0 | 0 |
3.0.25 | 0 | 0 | 0 | 0 | 0 |
3.0.24 | 0 | 0 | 0 | 0 | 0 |
3.0.22 | 0 | 0 | 0 | 0 | 0 |
3.0.21 | 0 | 0 | 0 | 0 | 0 |
3.0.20 | 0 | 0 | 0 | 0 | 0 |
3.0.19 | 0 | 0 | 0 | 0 | 0 |
3.0.18 | 0 | 0 | 0 | 0 | 0 |
3.0.17 | 0 | 0 | 0 | 0 | 0 |
3.0.16 | 0 | 0 | 0 | 0 | 0 |
3.0.15 | 0 | 0 | 0 | 0 | 0 |
3.0.14 | 0 | 0 | 0 | 0 | 0 |
3.0.13 | 0 | 0 | 0 | 0 | 0 |
3.0.12 | 0 | 0 | 0 | 0 | 0 |
3.0.10 | 0 | 0 | 0 | 0 | 0 |
3.0.4 | 0 | 0 | 0 | 0 | 0 |
3.0.3 | 0 | 0 | 0 | 0 | 0 |
3.0.2 | 0 | 0 | 0 | 0 | 0 |
3.0.1 | 0 | 0 | 0 | 0 | 0 |
3.0.0 | 0 | 0 | 0 | 0 | 0 |
2.1.76 | 0 | 0 | 0 | 0 | 0 |
2.1.75 | 0 | 0 | 0 | 0 | 0 |
2.1.74 | 0 | 0 | 0 | 0 | 0 |
2.1.73 | 0 | 0 | 0 | 0 | 0 |
2.1.72 | 0 | 0 | 0 | 0 | 0 |
2.1.71 | 0 | 0 | 0 | 0 | 0 |
2.1.70 | 0 | 0 | 0 | 0 | 0 |
2.1.69 | 0 | 0 | 0 | 0 | 0 |
2.1.68 | 0 | 0 | 0 | 0 | 0 |
2.1.65 | 0 | 0 | 0 | 0 | 0 |
2.1.64 | 0 | 0 | 0 | 0 | 0 |
2.1.63 | 0 | 0 | 0 | 0 | 0 |
2.1.62 | 0 | 0 | 0 | 0 | 0 |
2.1.61 | 0 | 0 | 0 | 0 | 0 |
2.1.60 | 0 | 0 | 0 | 0 | 0 |
2.1.59 | 0 | 0 | 0 | 0 | 0 |
2.1.58 | 0 | 0 | 0 | 0 | 0 |
2.1.57 | 0 | 0 | 0 | 0 | 0 |
2.1.55 | 0 | 0 | 0 | 0 | 0 |
2.1.54 | 0 | 0 | 0 | 0 | 0 |
2.1.53 | 0 | 0 | 0 | 0 | 0 |
2.1.52 | 0 | 0 | 0 | 0 | 0 |
2.1.51 | 0 | 0 | 0 | 0 | 0 |
2.1.50 | 0 | 0 | 0 | 0 | 0 |
2.1.49 | 0 | 0 | 0 | 0 | 0 |
2.1.48 | 0 | 0 | 0 | 0 | 0 |
2.1.47 | 0 | 0 | 0 | 0 | 0 |
2.1.46 | 0 | 0 | 0 | 0 | 0 |
2.1.45 | 0 | 0 | 0 | 0 | 0 |
2.1.44 | 0 | 0 | 0 | 0 | 0 |
2.1.43 | 0 | 0 | 0 | 0 | 0 |
2.1.42 | 0 | 0 | 0 | 0 | 0 |
2.1.41 | 0 | 0 | 0 | 0 | 0 |
2.1.40 | 0 | 0 | 0 | 0 | 0 |
2.1.39 | 0 | 0 | 0 | 0 | 0 |
2.1.38 | 0 | 0 | 0 | 0 | 0 |
2.1.37 | 0 | 0 | 0 | 0 | 0 |
2.1.36 | 0 | 0 | 0 | 0 | 0 |
2.1.35 | 0 | 0 | 0 | 0 | 0 |
2.1.32 | 0 | 0 | 0 | 0 | 0 |
2.1.30 | 0 | 0 | 0 | 0 | 0 |
2.1.28 | 0 | 0 | 0 | 0 | 0 |
2.1.27 | 0 | 0 | 0 | 0 | 0 |
2.1.26 | 0 | 0 | 0 | 0 | 0 |
2.1.25 | 0 | 0 | 0 | 0 | 0 |
2.1.24 | 0 | 0 | 0 | 0 | 0 |
2.1.23 | 0 | 0 | 0 | 0 | 0 |
2.1.22 | 0 | 0 | 0 | 0 | 0 |
2.1.21 | 0 | 0 | 0 | 0 | 0 |
2.1.20 | 0 | 0 | 0 | 0 | 0 |
2.1.19 | 0 | 0 | 0 | 0 | 0 |
2.1.17 | 0 | 0 | 0 | 0 | 0 |
2.1.16 | 0 | 0 | 0 | 0 | 0 |
2.1.15 | 0 | 0 | 0 | 0 | 0 |
2.1.14 | 0 | 0 | 0 | 0 | 0 |
2.1.13 | 0 | 0 | 0 | 0 | 0 |
2.1.12 | 0 | 0 | 0 | 0 | 0 |
2.1.11 | 0 | 0 | 0 | 0 | 0 |
2.1.9 | 0 | 0 | 0 | 0 | 0 |
2.1.8 | 0 | 0 | 0 | 0 | 0 |
2.1.7 | 0 | 0 | 0 | 0 | 0 |
2.1.6 | 0 | 0 | 0 | 0 | 0 |
2.1.5 | 0 | 0 | 0 | 0 | 0 |
2.1.4 | 0 | 0 | 0 | 0 | 0 |
2.1.3 | 0 | 0 | 0 | 0 | 0 |
2.1.2 | 0 | 0 | 0 | 0 | 0 |
2.1.1 | 0 | 0 | 0 | 0 | 0 |
2.1.0 | 0 | 0 | 0 | 0 | 0 |
2.0.9 | 0 | 0 | 0 | 0 | 0 |
2.0.8 | 0 | 0 | 0 | 0 | 0 |
2.0.7 | 0 | 0 | 0 | 0 | 0 |
2.0.6 | 0 | 0 | 0 | 0 | 0 |
2.0.5 | 0 | 0 | 0 | 0 | 0 |
2.0.4 | 0 | 0 | 0 | 0 | 0 |
2.0.3 | 0 | 0 | 0 | 0 | 0 |
2.0.2 | 0 | 0 | 0 | 0 | 0 |
2.0.1 | 0 | 0 | 0 | 0 | 0 |
2.0.0 | 0 | 0 | 0 | 0 | 0 |
1.0.11 | 0 | 0 | 0 | 0 | 0 |
1.0.4 | 0 | 0 | 0 | 0 | 0 |
1.0.3 | 0 | 0 | 0 | 0 | 0 |
1.0.2 | 0 | 0 | 0 | 0 | 0 |
1.0.1 | 0 | 0 | 0 | 0 | 0 |
1.0.0 | 0 | 0 | 0 | 0 | 0 |
5.0.4 - This version is safe to use because it has no known security vulnerabilities at this time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT License