weak-identity-map vulnerabilities

The WeakIdentityMap object holds key-value pairs of weakly referenced objects and remembers the original insertion order of the keys

Package versions

18 VERSIONS IN TOTAL
versionpublisheddirect vulnerabilities
1.2.310 Oct, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.3-next.13 Oct, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.219 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.2-next.419 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.2-next.319 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.2-next.217 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.2-next.116 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.19 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.1-next.19 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.2.09 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.49 Apr, 2024
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.314 Aug, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.212 Aug, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.112 Aug, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.1.011 Aug, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.311 Aug, 2023
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.217 Oct, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L
1.0.116 Oct, 2021
  • 0
    C
  • 0
    H
  • 0
    M
  • 0
    L

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Get started free