Skip to main content

Snyk Top 10: Vulnerabilities you should know

Find out which types of vulnerabilities are most likely to appear in your projects based on Snyk scan results and security research. Stay safe, stay educated, stay out of the headlines!

2022 results

Top first-party code vulnerabilities

Based on Snyk security intelligence research in 2022, our Snyk Top 10: Code Vulnerabilities report shows the risks teams frequently face when writing code. Here are the top three.

Directory traversal

A directory traversal (a.k.a. path traversal) attack aims to access files and directories that are stored outside of the authorized folder.

Cross-site scripting (XSS)

Cross-site scripting (XSS) is a website attack method that utilizes an injection to implant malicious scripts into trusted websites.

Hardcoded credentials

Credentials are hardcoded when they are written directly in the code, allowing everyone with access to the source code to access those credentials

PICK YOUR LANGUAGE

First-party code vulnerabilities by language

Only care about a language or two? Learn about the top code vulnerabilities our security researchers found in the ecosystem you use most.

snyk-top-10/feature-snyk-top-10-code-java-opal

FIRST-PARTY CODE

Top 10 Java vulnerabilities

Learn about the most prevalent Java vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-javascript-opal

FIRST-PARTY CODE

Top 10 JavaScript vulnerabilities

Learn about the most prevalent JavaScript vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-c-sharp-opal

FIRST-PARTY CODE

Top 10 C# vulnerabilities

Learn about the most prevalent C# vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-go-opal

FIRST-PARTY CODE

Top 10 Go vulnerabilities

Learn about the most prevalent Go vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-php-opal

FIRST-PARTY CODE

Top 10 PHP vulnerabilities

Learn about the most prevalent PHP vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-python-opal

FIRST-PARTY CODE

Top 10 Python vulnerabilities

Learn about the most prevalent Python vulnerabilities found by Snyk Code researchers in 2022.

Download
snyk-top-10/feature-snyk-top-10-code-ruby-opal

FIRST-PARTY CODE

Top 10 Ruby vulnerabilities

Learn about the most prevalent Ruby vulnerabilities found by Snyk Code researchers in 2022.

Download

2022 results

Top 3 critical and high OSS vulnerabilities

Based on user scan results from 2022, our Snyk Top 10: Open Source Vulnerabilities report shows the OSS risks teams most frequently face. Here are the top three.

Denial of service (DoS)

DoS attacks are used to shut down access to a network or server by bombarding the target with so many requests that it’s unable to process the load.

Remote code execution (RCE)

RCE attacks occur when a bad actor is able to run commands from a remote system that they shouldn’t have access to, leading to malware, exploits, and more.

Deserializing untrusted data

When an application deserializes untrusted data without sufficiently verifying that the resulting data will be valid, an attacker can control the state or the flow of the execution.

PICK YOUR LANGUAGE

Open source vulnerabilities by language

Only care about a language or two? Learn about the top high and critical open source vulnerabilities in the ecosystem you use most.

snyk-top-10/feature-snyk-top-10-oss-java-opal

OPEN SOURCE

Top 10 Java vulnerabilities

Learn about the top high and critical open source vulnerabilities in Java.

Download
snyk-top-10/feature-snyk-top-10-oss-javascript-opal

OPEN SOURCE

Top 10 JavaScript vulnerabilities

Learn about the top high and critical open source vulnerabilities in JavaScript.

Download
snyk-top-10/feature-snyk-top-10-oss-go-opal

OPEN SOURCE

Top 10 Go vulnerabilities

Learn about the top high and critical open source vulnerabilities in Go.

Download
snyk-top-10/feature-snyk-top-10-oss-dotnet-opal

OPEN SOURCE

Top 10 .NET vulnerabilities

Learn about the top high and critical open source vulnerabilities in .NET.

Download
snyk-top-10/feature-snyk-top-10-oss-php-opal

OPEN SOURCE

Top 10 PHP vulnerabilities

Learn about the top high and critical open source vulnerabilities in PHP.

Download
snyk-top-10/feature-snyk-top-10-oss-python-opal

OPEN SOURCE

Top 10 Python vulnerabilities

Learn about the top high and critical open source vulnerabilities in Python.

Download
snyk-top-10/feature-snyk-top-10-oss-ruby-opal

OPEN SOURCE

Top 10 Ruby vulnerabilities

Learn about the top high and critical open source vulnerabilities in Ruby.

Download

Security Intelligence: Vom Code zur Cloud

Unsere Security Intelligence führt die Insights mehrerer strategischer Elemente zusammen. Hierzu gehören öffentliche Quellen, Daten aus der Dev-Community, Analysen unserer Experten, maschinelles Lernen und humangesteuerte künstliche Intelligenz.

Snyk Schwachstellen-Datenbank

Mit unserer Schwachstellen-Datenbank erhalten Sie validierte, detaillierte Informationen und Fixes für Open-Source- und Container-Schwachstellen.

Snyk Code Knowledge Base

Mit den stets aktuellsten Daten für Code-Sicherheit reduzieren Sie False Positives und nutzen nahtlos umsetzbare Fixes in Ihrem SDLC.

Eine Policy-Engine für alles

Die Snyk Policy-Engine instituiert Security-Richtlinien für IaC-Dateien und für Cloud-Ressourcen in der Runtime.

Jetzt starten mit Security Intelligence von Snyk

Sehen heißt Verstehen: Wie Sie mit unseren Tools und unserer umfassenden Schwachstellen-Datenbank Gefahrenherde erkennen und beseitigen, erschließt sich besten „am Objekt“.

Snyk in Aktion

Erleben Sie unsere Features in einer Live-Demo unserer Experten:

Open-Source- und Container-Sicherheit

Scans von proprietärem Code

Cloud- und IaC-Sicherheit