-
## WS-2022-0322 - High Severity Vulnerability
Vulnerable Library - d3-color-1.4.1.tgz
Color spaces! RGB, HSL, Cubehelix, Lab and HCL (Lch).
Library home page: https://registry.npmjs.org/d3-color/-/d…
-
## CVE-2017-16113 - High Severity Vulnerability
Vulnerable Library - parsejson-0.0.3.tgz
Method that parses a JSON string and returns a JSON object
Library home page: https://registry.npmjs.org/pars…
-
## CVE-2017-16113 - High Severity Vulnerability
Vulnerable Library - parsejson-0.0.3.tgz
Method that parses a JSON string and returns a JSON object
Library home page: https://registry.npmjs.org/pars…
-
## CVE-2021-23343 - High Severity Vulnerability
Vulnerable Library - path-parse-1.0.6.tgz
Node.js path.parse() ponyfill
Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tg…
-
## CVE-2023-26118 - Medium Severity Vulnerability
Vulnerable Library - angular-1.6.10.tgz
HTML enhanced for web apps
Library home page: https://registry.npmjs.org/angular/-/angular-1.6.10.tgz
Path t…
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-1.0.0.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…
-
## CVE-2021-3795 - High Severity Vulnerability
Vulnerable Library - semver-regex-1.0.0.tgz
Regular expression for matching semver versions
Library home page: https://registry.npmjs.org/semver-regex/…
-
Considering the following expression: **2/1(2+1)** the answer should be **6**, right?
#### Conventional interpretation
```bash
➜ ~ qalc
> 2/1(2+1)
Please select interpretation of expressions…
-
## CVE-2022-21680 - High Severity Vulnerability
Vulnerable Library - marked-2.0.7.tgz
A markdown parser built for speed
Library home page: https://registry.npmjs.org/marked/-/marked-2.0.7.tgz
Path t…
-
## CVE-2021-23343 - High Severity Vulnerability
Vulnerable Library - path-parse-1.0.6.tgz
Node.js path.parse() ponyfill
Library home page: https://registry.npmjs.org/path-parse/-/path-parse-1.0.6.tg…