| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 2.47 | 0 | 0 | 0 | 0 | 0 |
| 2.47 | 0 | 0 | 0 | 0 | 0 |
| 2.46 | 0 | 0 | 0 | 0 | 0 |
| 2.46 | 0 | 0 | 0 | 0 | 0 |
| 2.45 | 0 | 0 | 0 | 0 | 0 |
| 2.45 | 0 | 0 | 0 | 0 | 0 |
| 2.44_01 | 0 | 0 | 0 | 0 | 0 |
| 2.44_01 | 0 | 0 | 0 | 0 | 0 |
| 2.44 | 0 | 0 | 0 | 0 | 0 |
| 2.44 | 0 | 0 | 0 | 0 | 0 |
| 2.43 | 0 | 0 | 0 | 0 | 0 |
| 2.43 | 0 | 0 | 0 | 0 | 0 |
| 2.42_01 | 0 | 0 | 0 | 0 | 0 |
| 2.42_01 | 0 | 0 | 0 | 0 | 0 |
| 2.41 | 0 | 0 | 0 | 0 | 0 |
| 2.41 | 0 | 0 | 0 | 0 | 0 |
| 2.40_02 | 0 | 0 | 0 | 0 | 0 |
| 2.40_01 | 0 | 0 | 0 | 0 | 0 |
| 2.40_01 | 0 | 0 | 0 | 0 | 0 |
| 2.40 | 0 | 0 | 0 | 0 | 0 |
| 2.36 | 0 | 0 | 0 | 0 | 0 |
| 2.35 | 0 | 0 | 0 | 0 | 0 |
| 2.34 | 0 | 0 | 0 | 0 | 0 |
| 2.33 | 0 | 0 | 0 | 0 | 0 |
| 2.32 | 0 | 0 | 0 | 0 | 0 |
| 2.31 | 0 | 0 | 0 | 0 | 0 |
| 2.31 | 0 | 0 | 0 | 0 | 0 |
| 2.30 | 0 | 0 | 0 | 0 | 0 |
| 2.30 | 0 | 0 | 0 | 0 | 0 |
| 2.30 | 0 | 0 | 0 | 0 | 0 |
| 2.29 | 0 | 0 | 0 | 0 | 0 |
| 2.28 | 0 | 0 | 0 | 0 | 0 |
| 2.27 | 0 | 0 | 0 | 0 | 0 |
| 2.27 | 0 | 0 | 0 | 0 | 0 |
| 2.26 | 0 | 0 | 0 | 0 | 0 |
| 2.26 | 0 | 0 | 0 | 0 | 0 |
| 2.26 | 0 | 0 | 0 | 0 | 0 |
| 2.26 | 0 | 0 | 0 | 0 | 0 |
| 2.25 | 0 | 0 | 0 | 0 | 0 |
| 2.24 | 0 | 0 | 0 | 0 | 0 |
| 2.23 | 0 | 0 | 0 | 0 | 0 |
| 2.23 | 0 | 0 | 0 | 0 | 0 |
| 2.22 | 0 | 0 | 0 | 0 | 0 |
| 2.21 | 0 | 0 | 0 | 0 | 0 |
| 2.21 | 0 | 0 | 0 | 0 | 0 |
| 2.20 | 0 | 0 | 0 | 0 | 0 |
| 2.20 | 0 | 0 | 0 | 0 | 0 |
| 2.19 | 0 | 0 | 0 | 0 | 0 |
| 2.19 | 0 | 0 | 0 | 0 | 0 |
| 2.18 | 0 | 0 | 0 | 0 | 0 |
| 2.17 | 0 | 0 | 0 | 0 | 0 |
| 2.16 | 0 | 0 | 0 | 0 | 0 |
2.47 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
Artistic-1.0 - Artistic License 1.0