Latest version: v0.3.6
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
With the help of this module, classes can be inherited that are built and configured after their needs are met (instead of being launched immediately after creation).
No known vulnerabilities found
Has known vulnerabilities