Snyk Icon

Snyk

Enabling more than 300,000 developers to automatically find and fix open source vulnerabilities.
snyk.io • 11 Stories
All Sources

Liran Tal Snyk

JavaScript frameworks security report 2019

Liran Tal:

In this report, we investigate the state of security for both the Angular and React ecosystems, looking at best practices, secure coding, and security vulnerabilities in React, Angular, and other frontend projects such as Bootstrap, Vue.js, and jQuery. Inside you will find the report in it’s digital format as a PDF to download and review offline.

Liran Tal Snyk

Sequelize ORM found vulnerable to SQL injection

SQL injection is a serious vulnerability, effectively allowing an attacker to run roughshod over your entire database. If you’re using Sequelize, drop everything (pun unintended) and get patched up.

As a testament for Sequelize’s commitment to security and protecting their users as fast as possible, they promptly responded and released fixes in the 3.x and 5.x branches of the library, remediating the vulnerability and providing users with an upgrade path for SQL injection prevention.

Liran Tal Snyk

Staying ahead of security vulnerabilities with security patches

Liran Tal:

How do you cope with the issues of libraries having security vulnerabilities but there’s no fix yet? With open source packages this might even be more apparent than ever. Maintainers are rightfully not in any contract to provide you support, yet you rely on third-party software by volunteers.

In this piece I want to show you how we’ve adopted surgical patches to help remove this burden and risk from users.

Snyk Icon Snyk

Top ten most popular docker images each contain at least 30 vulnerabilities

The adoption of application container technology is increasing at a remarkable rate and is expected to grow by a further 40% in 2020, according to 451 Research. It is common for system libraries to be available in many docker images, as these rely on a parent image that is commonly using a Linux distribution as a base.

In many cases, remediation is as simple as rebuilding the image or swapping out the base image, but it’s not always that easy. Click through for more analysis and advice.

Top ten most popular docker images each contain at least 30 vulnerabilities
Player art
  0:00 / 0:00