anti-trojan-source vulnerabilities

Detect trojan source attacks that employ unicode bidi attacks to inject malicious code

Package versions

18 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
1.8.03 Nov, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.7.01 Nov, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.6.031 Oct, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.5.030 Oct, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.330 Oct, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.230 Oct, 2025
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.14 Jan, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.4.010 Dec, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.320 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.26 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.16 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.3.06 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.46 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.35 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.25 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.05 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.05 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.05 Nov, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free