We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
This is the vulnerability: GHSA-2p57-rm9w-gvfp
It was fixed in unleash-client-node 5.5.4: Unleash/unleash-client-node#622
No response
5.6.6
Open source
Self-hosted
[email protected] (and possibly other dependents of unleash-client-node?)
The text was updated successfully, but these errors were encountered:
Ah! This appears to be fixed in 1.4.4-beta.0 (although it's not noted in the tag description)
Sorry, something went wrong.
We will ship new version today. I checked and this SDK doesn't use the vulnerable package, because it doesn't support "IP" and "Hostname" strategies.
v1.4.4
Tymek
No branches or pull requests
Describe the bug
This is the vulnerability: GHSA-2p57-rm9w-gvfp
It was fixed in unleash-client-node 5.5.4: Unleash/unleash-client-node#622
Steps to reproduce the bug
No response
Expected behavior
No response
Logs, error output, etc.
No response
Screenshots
No response
Additional context
No response
Unleash version
5.6.6
Subscription type
Open source
Hosting type
Self-hosted
SDK information (language and version)
[email protected] (and possibly other dependents of unleash-client-node?)
The text was updated successfully, but these errors were encountered: