eckey-utils vulnerabilities

Node.js based EC key utilities that can generate PEM keys (required by crypto.sign and crypto.verify) from the raw ones usually but not necessarily generated by crypto.ECDH

Package versions

24 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
0.7.1416 Dec, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.1328 Jan, 2019
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.1228 Jan, 2019
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.115 Jan, 2019
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.1024 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.917 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.817 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.716 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.616 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.516 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.412 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.312 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.210 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.15 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.7.05 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.6.65 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.6.55 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.6.45 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.6.34 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
0.6.24 Dec, 2018
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free