We’ve disclosed 3404 vulnerabilities
by Snyk Security
Researchers
How to fix?
Avoid using all malicious instances of the tukaani-project/xz
package.
test-poc3 is a malicious package. This package contains malicious code, and its content was removed from the official package manager. While this package might be attempting to impersonate a valid organization, there is no connection between that organization and this package authorship.
ryu is a Component-based Software-defined Networking Framework
Affected versions of this package are vulnerable to Infinite Loop in the OFPPacketQueue()
function in *parser.py
. An attacker can cause denial of service by sending data with OFPQueueProp.len
set to 0.
Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling due to the lack of limitation of sockets for the management interface, it may be possible to cause a denial of service hitting the nofile
limit as there is no possibility to configure or set a maximum number of connections.
Improper Certificate Validation in componentspace.saml2 (nuget)
Arbitrary Code Injection in mysql2 (npm)
Prototype Pollution in lodash (npm)
Prototype Pollution in lodash.zipobjectdeep (npm)
Remote Code Execution (RCE) in mysql2 (npm)
by Snyk Security
Researchers
Snyk is a developer security platform. Integrating directly into development tools, workflows, and automation pipelines, Snyk makes it easy for teams to find, prioritize, and fix security vulnerabilities in code, dependencies, containers, and infrastructure as code. Supported by industry-leading application and security intelligence, Snyk puts security expertise in any developer's toolkit.