| Vulnerabilities | |||||
|---|---|---|---|---|---|
| Version | Suggest | Low | Medium | High | Critical |
| 0.10.0 | 0 | 0 | 0 | 0 | 0 |
| 0.9.8 | 0 | 0 | 0 | 0 | 0 |
| 0.9.7 | 0 | 0 | 1 | 0 | 0 |
| 0.9.6 | 0 | 0 | 1 | 0 | 0 |
| 0.9.5 | 0 | 0 | 1 | 0 | 0 |
| 0.9.4 | 0 | 0 | 1 | 0 | 0 |
| 0.9.3 | 0 | 0 | 1 | 0 | 0 |
| 0.9.2 | 0 | 0 | 0 | 0 | 0 |
| 0.9.1 | 0 | 0 | 0 | 0 | 0 |
| 0.9.0 | 0 | 0 | 0 | 0 | 0 |
| 0.8.0 | 0 | 0 | 0 | 0 | 0 |
| 0.7.1 | 0 | 0 | 0 | 0 | 0 |
| 0.7.0 | 0 | 0 | 0 | 0 | 0 |
| 0.6.0 | 0 | 0 | 0 | 0 | 0 |
| 0.5.2 | 0 | 0 | 0 | 0 | 0 |
| 0.5.1 | 0 | 0 | 1 | 0 | 0 |
| 0.5.0 | 0 | 0 | 1 | 0 | 0 |
| 0.4.10 | 0 | 0 | 1 | 0 | 0 |
| 0.4.9 | 0 | 0 | 1 | 0 | 0 |
| 0.4.8 | 0 | 0 | 1 | 0 | 0 |
| 0.4.7 | 0 | 0 | 1 | 0 | 0 |
| 0.4.6 | 0 | 0 | 1 | 0 | 0 |
| 0.4.5 | 0 | 0 | 1 | 0 | 0 |
| 0.4.4 | 0 | 0 | 1 | 0 | 0 |
| 0.4.3 | 0 | 0 | 1 | 0 | 0 |
| 0.4.2 | 0 | 0 | 1 | 0 | 0 |
| 0.4.1 | 0 | 0 | 1 | 0 | 0 |
| 0.4.0 | 0 | 0 | 1 | 0 | 0 |
| 0.3.5 | 0 | 0 | 1 | 0 | 0 |
| 0.3.4 | 0 | 0 | 1 | 0 | 0 |
| 0.3.3 | 0 | 0 | 1 | 0 | 0 |
| 0.3.2 | 0 | 0 | 1 | 0 | 0 |
| 0.3.1 | 0 | 0 | 1 | 0 | 0 |
| 0.3.0 | 0 | 0 | 1 | 0 | 0 |
| 0.2.1 | 0 | 0 | 1 | 0 | 0 |
| 0.2.0 | 0 | 0 | 1 | 0 | 0 |
| 0.1.4 | 0 | 0 | 1 | 0 | 0 |
| 0.1.3 | 0 | 0 | 1 | 0 | 0 |
| 0.1.2 | 0 | 0 | 1 | 0 | 0 |
0.10.0 - This version may not be safe as it has not been updated for a long time. Find out if your coding project uses this component and get notified of any reported security vulnerabilities with Meterian-X Open Source Security Platform
Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.
MIT - MIT License