Vulnerabilities | |||||
---|---|---|---|---|---|
Version | Suggest | Low | Medium | High | Critical |
4.3.0 | 0 | 0 | 0 | 0 | 0 |
4.2.2 | 0 | 0 | 0 | 0 | 0 |
4.2.1 | 0 | 0 | 0 | 0 | 0 |
4.2.0 | 0 | 0 | 0 | 0 | 0 |
4.1.2 | 0 | 0 | 0 | 0 | 0 |
4.1.1 | 0 | 0 | 0 | 0 | 0 |
4.1.0 | 0 | 0 | 0 | 0 | 0 |
4.0.0 | 0 | 0 | 0 | 0 | 0 |
3.1.15 | 0 | 0 | 0 | 0 | 0 |
3.1.13 | 0 | 0 | 0 | 0 | 0 |
3.1.12 | 0 | 0 | 0 | 0 | 0 |
3.1.11 | 0 | 0 | 0 | 0 | 0 |
3.1.10 | 0 | 0 | 0 | 0 | 0 |
3.1.9 | 0 | 0 | 0 | 0 | 0 |
3.1.8 | 0 | 0 | 0 | 0 | 0 |
3.1.7 | 0 | 0 | 0 | 0 | 0 |
3.1.6 | 0 | 0 | 0 | 0 | 0 |
3.1.5 | 0 | 0 | 0 | 0 | 0 |
3.1.4 | 0 | 0 | 0 | 0 | 0 |
3.1.3 | 0 | 0 | 0 | 0 | 0 |
3.1.2 | 0 | 0 | 0 | 0 | 0 |
3.1.1 | 0 | 0 | 0 | 0 | 0 |
3.1.0 | 0 | 0 | 0 | 0 | 0 |
3.0.1 | 0 | 0 | 0 | 0 | 0 |
3.0.0 | 0 | 0 | 0 | 0 | 0 |
2.5.2 | 0 | 0 | 0 | 0 | 0 |
2.5.1 | 0 | 0 | 0 | 0 | 0 |
2.5.0 | 0 | 0 | 0 | 0 | 0 |
2.4.0 | 0 | 0 | 0 | 0 | 0 |
2.3.0 | 0 | 0 | 0 | 0 | 0 |
2.2.1 | 0 | 0 | 0 | 0 | 0 |
2.2.0 | 0 | 0 | 0 | 0 | 0 |
2.1.1 | 0 | 0 | 0 | 0 | 0 |
2.1.0 | 0 | 0 | 0 | 0 | 0 |
2.0.5 | 0 | 0 | 0 | 0 | 0 |
2.0.4 | 0 | 0 | 0 | 0 | 0 |
2.0.3 | 0 | 0 | 0 | 0 | 0 |
2.0.2 | 0 | 0 | 0 | 0 | 0 |
2.0.1 | 0 | 0 | 0 | 0 | 0 |
2.0.0 | 0 | 0 | 0 | 0 | 0 |
1.0.1 | 0 | 0 | 0 | 0 | 0 |
1.0.0 | 0 | 0 | 0 | 0 | 0 |
4.3.0 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT License