-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-1.0.0.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-1.0.0.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…
-
## CVE-2021-43307 - High Severity Vulnerability
Vulnerable Library - semver-regex-3.1.2.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex…
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Libraries - semver-regex-3.1.2.tgz, semver-regex-1.0.0.tgz
semver-regex-3.1.2.tgz
Regular expression for matching semver versions
Library …
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-3.1.2.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…
-
## CVE-2021-23343 - High Severity Vulnerability
Vulnerable Library - path-parse-1.0.6.tgz
Node.js path.parse() ponyfill
Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tg…
-
Wrapping an expression in parenthesis seems to cause what otherwise is valid to be invalid:
`(3 + Pow(2, 3))`
In MathEvaluator.TryComma(), _nestedFunctionDepth (which is 1) < _nestedGroupDepth (whic…
-
## CVE-2021-3807 - High Severity Vulnerability
Vulnerable Libraries - ansi-regex-3.0.0.tgz, ansi-regex-5.0.0.tgz
ansi-regex-3.0.0.tgz
Regular expression for matching ANSI escape codes
Library home…
-
## CVE-2021-23343 - High Severity Vulnerability
Vulnerable Library - path-parse-1.0.6.tgz
Node.js path.parse() ponyfill
Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tg…
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-3.1.2.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…