impaktapps-jsonforms vulnerabilities
This a act21 product low code platform, this new low code platform makes it easy to convert JSON data into a user interface. With this platform, you can create dynamic user interfaces quickly and easily.
Package versions
101 - 200 of 1537 Results
version | published | direct vulnerabilities |
---|---|---|
5.426.1244-alpha.417 | 2 Sep, 2024 |
|
5.426.1244-alpha.416 | 2 Sep, 2024 |
|
5.426.1244-alpha.415 | 2 Sep, 2024 |
|
5.426.1244-alpha.414 | 2 Sep, 2024 |
|
5.426.1244-alpha.413 | 2 Sep, 2024 |
|
5.426.1244-alpha.412 | 2 Sep, 2024 |
|
5.426.1244-alpha.411 | 2 Sep, 2024 |
|
5.426.1244-alpha.410 | 2 Sep, 2024 |
|
5.426.1244-alpha.409 | 2 Sep, 2024 |
|
5.426.1244-alpha.408 | 2 Sep, 2024 |
|
5.426.1244-alpha.407 | 2 Sep, 2024 |
|
5.426.1244-alpha.406 | 2 Sep, 2024 |
|
5.426.80-alpha.24 | 2 Sep, 2024 |
|
5.426.80-alpha.23 | 2 Sep, 2024 |
|
5.426.80-alpha.22 | 2 Sep, 2024 |
|
5.426.80-alpha.21 | 2 Sep, 2024 |
|
5.426.80-alpha.20 | 2 Sep, 2024 |
|
5.426.80-alpha.19 | 2 Sep, 2024 |
|
5.426.80-alpha.18 | 2 Sep, 2024 |
|
5.426.80-alpha.17 | 2 Sep, 2024 |
|
5.426.1244-alpha.405 | 2 Sep, 2024 |
|
5.426.76 | 2 Sep, 2024 |
|
5.426.80-alpha.16 | 2 Sep, 2024 |
|
5.426.80-alpha.15 | 31 Aug, 2024 |
|
5.426.80-alpha.14 | 31 Aug, 2024 |
|
5.426.80-alpha.13 | 31 Aug, 2024 |
|
5.426.80-alpha.12 | 31 Aug, 2024 |
|
5.426.80-alpha.10 | 31 Aug, 2024 |
|
5.426.80-alpha.9 | 31 Aug, 2024 |
|
5.426.80-alpha.8 | 31 Aug, 2024 |
|
5.426.80-alpha.7 | 30 Aug, 2024 |
|
5.426.80-alpha.5 | 30 Aug, 2024 |
|
5.426.80-alpha.4 | 30 Aug, 2024 |
|
5.426.80-alpha.2 | 30 Aug, 2024 |
|
5.426.80-alpha.1 | 30 Aug, 2024 |
|
5.426.6712 | 30 Aug, 2024 |
|
5.426.1244-alpha.404 | 30 Aug, 2024 |
|
5.426.80 | 30 Aug, 2024 |
|
5.426.1244-alpha.403 | 29 Aug, 2024 |
|
5.426.1244-alpha.402 | 29 Aug, 2024 |
|
5.426.1244-alpha.401 | 29 Aug, 2024 |
|
5.426.1244-alpha.400 | 29 Aug, 2024 |
|
5.426.1244-alpha.399 | 29 Aug, 2024 |
|
5.426.1244-alpha.398 | 29 Aug, 2024 |
|
5.426.1244-alpha.397 | 29 Aug, 2024 |
|
5.426.6711 | 28 Aug, 2024 |
|
5.426.6710 | 28 Aug, 2024 |
|
5.426.6709 | 28 Aug, 2024 |
|
5.426.6708 | 28 Aug, 2024 |
|
5.426.6707 | 28 Aug, 2024 |
|
5.426.6705 | 28 Aug, 2024 |
|
5.426.1244-alpha.396 | 28 Aug, 2024 |
|
5.426.6704 | 28 Aug, 2024 |
|
5.426.6703 | 28 Aug, 2024 |
|
5.426.6702 | 28 Aug, 2024 |
|
5.426.6701 | 28 Aug, 2024 |
|
5.426.6700 | 28 Aug, 2024 |
|
5.426.6999 | 28 Aug, 2024 |
|
5.426.61-alpha.601 | 28 Aug, 2024 |
|
5.426.61-alpha.600 | 27 Aug, 2024 |
|
5.426.1244-alpha.395 | 27 Aug, 2024 |
|
5.426.1244-alpha.394 | 23 Aug, 2024 |
|
5.426.61-alpha.100 | 23 Aug, 2024 |
|
5.426.1244-alpha.393 | 23 Aug, 2024 |
|
5.426.1244-alpha.392 | 23 Aug, 2024 |
|
5.426.1244-alpha.391 | 23 Aug, 2024 |
|
5.426.1244-alpha.390 | 23 Aug, 2024 |
|
5.426.1244-alpha.389 | 23 Aug, 2024 |
|
5.426.1244-alpha.388 | 23 Aug, 2024 |
|
5.426.1244-alpha.387 | 23 Aug, 2024 |
|
5.426.1244-alpha.386 | 23 Aug, 2024 |
|
5.426.79-alpha.23 | 22 Aug, 2024 |
|
5.426.79-alpha.22 | 22 Aug, 2024 |
|
5.426.79-alpha.21 | 22 Aug, 2024 |
|
5.426.79-alpha.20 | 22 Aug, 2024 |
|
5.426.79-alpha.19 | 22 Aug, 2024 |
|
5.426.1244-alpha.385 | 22 Aug, 2024 |
|
5.426.79-alpha.18 | 22 Aug, 2024 |
|
5.426.79-alpha.17 | 22 Aug, 2024 |
|
5.426.79-alpha.16 | 22 Aug, 2024 |
|
5.426.1244-alpha.384 | 22 Aug, 2024 |
|
5.426.79-alpha.15 | 22 Aug, 2024 |
|
5.426.1244-alpha.383 | 22 Aug, 2024 |
|
5.426.79-alpha.13 | 22 Aug, 2024 |
|
5.426.79-alpha.12 | 22 Aug, 2024 |
|
5.426.79-alpha.10 | 22 Aug, 2024 |
|
5.426.1244-alpha.382 | 22 Aug, 2024 |
|
5.426.79-alpha.9 | 22 Aug, 2024 |
|
5.426.79-alpha.8 | 22 Aug, 2024 |
|
5.426.1244-alpha.381 | 22 Aug, 2024 |
|
5.426.1244-alpha.380 | 22 Aug, 2024 |
|
5.426.79-alpha.7 | 22 Aug, 2024 |
|
5.426.1244-alpha.379 | 22 Aug, 2024 |
|
5.426.1244-alpha.378 | 22 Aug, 2024 |
|
5.426.1244-alpha.377 | 22 Aug, 2024 |
|
5.426.1244-alpha.376 | 22 Aug, 2024 |
|
5.426.1244-alpha.375 | 22 Aug, 2024 |
|
5.426.79-alpha.6 | 22 Aug, 2024 |
|
5.426.1244-alpha.374 | 22 Aug, 2024 |
|
5.426.1244-alpha.373 | 22 Aug, 2024 |
|
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Get started free