| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 2.20.0 | 0 | 0 | 0 | 0 | 0 |
| 2.19.0 | 0 | 0 | 0 | 0 | 0 |
| 2.18.0 | 0 | 0 | 0 | 0 | 0 |
| 2.17.1 | 0 | 0 | 0 | 0 | 0 |
| 2.17.0 | 0 | 0 | 0 | 0 | 0 |
| 2.16.4 | 0 | 0 | 0 | 0 | 0 |
| 2.16.3 | 0 | 0 | 0 | 0 | 0 |
| 2.16.2 | 0 | 0 | 0 | 0 | 0 |
| 2.16.1 | 0 | 0 | 0 | 0 | 0 |
| 2.16.0 | 0 | 0 | 0 | 0 | 0 |
| 2.15.0 | 0 | 0 | 0 | 0 | 0 |
| 2.14.0 | 0 | 0 | 0 | 0 | 0 |
| 2.13.1 | 0 | 0 | 0 | 0 | 0 |
| 2.13.0 | 0 | 0 | 0 | 0 | 0 |
| 2.12.0 | 0 | 0 | 0 | 0 | 0 |
| 2.11.1 | 0 | 0 | 0 | 0 | 0 |
| 2.11.0 | 0 | 0 | 0 | 0 | 0 |
| 2.10.1 | 0 | 0 | 0 | 0 | 0 |
| 2.10.0 | 0 | 0 | 0 | 0 | 0 |
| 2.9.11 | 0 | 0 | 0 | 0 | 0 |
| 2.9.10 | 0 | 0 | 0 | 0 | 0 |
| 2.9.9 | 0 | 0 | 0 | 0 | 0 |
| 2.9.8 | 0 | 0 | 0 | 0 | 0 |
| 2.9.7 | 0 | 0 | 0 | 0 | 0 |
| 2.9.6 | 0 | 0 | 0 | 0 | 0 |
| 2.9.5 | 0 | 0 | 0 | 0 | 0 |
| 2.9.4 | 0 | 0 | 0 | 0 | 0 |
| 2.9.3 | 0 | 0 | 0 | 0 | 0 |
| 2.9.2 | 0 | 0 | 0 | 0 | 0 |
| 2.9.1 | 0 | 0 | 0 | 0 | 0 |
| 2.9.0 | 0 | 0 | 0 | 0 | 0 |
| 2.8.1 | 0 | 0 | 0 | 0 | 0 |
| 2.8.0 | 0 | 0 | 0 | 0 | 0 |
| 2.6.0 | 0 | 0 | 0 | 0 | 0 |
| 2.5.0 | 0 | 0 | 0 | 0 | 0 |
| 2.4.3 | 0 | 0 | 0 | 0 | 0 |
| 2.4.2 | 0 | 0 | 0 | 0 | 0 |
| 2.4.1 | 0 | 0 | 0 | 0 | 0 |
| 2.4.0 | 0 | 0 | 0 | 0 | 0 |
| 2.3.0 | 0 | 0 | 0 | 0 | 0 |
| 2.2.1 | 0 | 0 | 0 | 0 | 0 |
| 2.2.0 | 0 | 0 | 0 | 0 | 0 |
| 2.1.1 | 0 | 0 | 0 | 0 | 0 |
| 2.1.0 | 0 | 0 | 0 | 0 | 0 |
| 2.0.4 | 0 | 0 | 0 | 0 | 0 |
| 2.0.3 | 0 | 0 | 0 | 0 | 0 |
| 2.0.2 | 0 | 0 | 0 | 0 | 0 |
| 2.0.1 | 0 | 0 | 0 | 0 | 0 |
| 2.0.0 | 0 | 0 | 0 | 0 | 0 |
| 1.0.8 | 0 | 0 | 0 | 0 | 0 |
| 1.0.7 | 0 | 0 | 0 | 0 | 0 |
| 1.0.6 | 0 | 0 | 0 | 0 | 0 |
| 1.0.5 | 0 | 0 | 0 | 0 | 0 |
| 1.0.4 | 0 | 0 | 0 | 0 | 0 |
| 1.0.3 | 0 | 0 | 0 | 0 | 0 |
| 1.0.2 | 0 | 0 | 0 | 0 | 0 |
| 1.0.1 | 0 | 0 | 0 | 0 | 0 |
| 1.0.0 | 0 | 0 | 0 | 0 | 0 |
| 0.0.18 | 0 | 0 | 0 | 0 | 0 |
| 0.0.17 | 0 | 0 | 0 | 0 | 0 |
| 0.0.16 | 0 | 0 | 0 | 0 | 0 |
| 0.0.15 | 0 | 0 | 0 | 0 | 0 |
| 0.0.14 | 0 | 0 | 0 | 0 | 0 |
| 0.0.13 | 0 | 0 | 0 | 0 | 0 |
| 0.0.12 | 0 | 0 | 0 | 0 | 0 |
| 0.0.11 | 0 | 0 | 0 | 0 | 0 |
| 0.0.10 | 0 | 0 | 0 | 0 | 0 |
| 0.0.9 | 0 | 0 | 0 | 0 | 0 |
| 0.0.7 | 0 | 0 | 0 | 0 | 0 |
| 0.0.6 | 0 | 0 | 0 | 0 | 0 |
| 0.0.5 | 0 | 0 | 0 | 0 | 0 |
| 0.0.4 | 0 | 0 | 0 | 0 | 0 |
| 0.0.3 | 0 | 0 | 0 | 0 | 0 |
| 0.0.2 | 0 | 0 | 0 | 0 | 0 |
| 0.0.1 | 0 | 0 | 0 | 0 | 0 |
2.20.0 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT License