
Explore packages and vulnerabilities by …
Operating system
Infrastructure as Code
Vulnerabilities from the last week
SQL Injection
ghost is a publishing platform
Affected versions of this package are vulnerable to SQL Injection via the /ghost/api/admin/members/events endpoint due to the improper validation of postId. An attacker can execute arbitrary SQL commands by sending crafted requests to this endpoint while authenticated with Admin API credentials.
Server-side Request Forgery (SSRF)
picklescan is a Security scanner detecting Python Pickle files performing suspicious actions
Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the io.FileIO() and urllib.request.urlopen() functions chaining. An attacker can access arbitrary files on the server and exfiltrate their contents to an external location by submitting specially crafted pickle data that leverages io.FileIO and urllib.request.urlopen.
Access of Resource Using Incompatible Type ('Type Confusion')
org.webjars.npm:preact is a fast 3kB alternative to React with the same modern API.
Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') during rendering in the vnode constructor. An attacker can inject arbitrary HTML or execute scripts by supplying specially crafted JSON objects that are incorrectly interpreted as valid VNodes when unsanitized, unvalidated user input is passed directly into the render tree.
Note:
This is only exploitable if applications pass unmodified, unsanitized values from user-modifiable data sources directly into the render tree, assume these values are strings while the data source could return JavaScript objects, and the data source fails to perform type sanitization or is compromised.
##Workaround
This vulnerability can be mitigated by validating input types, enforcing strict type contracts at API boundaries, casting or validating network data before rendering, sanitizing external data, and implementing a strict Content Security Policy (CSP) to prevent inline script execution.
Recent vulnerabilities disclosed by Snyk
- H
Prototype Pollution in pace-js (npm)- C
Remote Code Execution (RCE) in n8n-workflow (npm)- C
Remote Code Execution (RCE) in n8n-nodes-base (npm)- C
Remote Code Execution (RCE) in @n8n/config (npm)- M
Cross-site Request Forgery (CSRF) in fastapi-sso (pip)
Snyk security
researchers
have disclosed
3455
vulnerabilities
About Snyk dependencies vulnerability database
Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer's toolkit.




