1.19.2
4 years ago
2 months ago
Known vulnerabilities in the @builder.io/qwik-city package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
@builder.io/qwik-city is a The meta-framework for Qwik. Affected versions of this package are vulnerable to Access of Resource Using Incompatible Type ('Type Confusion') in the How to fix Access of Resource Using Incompatible Type ('Type Confusion')? Upgrade | <1.19.2 |
@builder.io/qwik-city is a The meta-framework for Qwik. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) via inconsistent interpretation of HTTP request headers in the server-side request handler. An attacker can bypass protections by submitting specially crafted or multi-valued How to fix Cross-site Request Forgery (CSRF)? Upgrade | <1.19.0 |
@builder.io/qwik-city is a The meta-framework for Qwik. Affected versions of this package are vulnerable to Open Redirect via the How to fix Open Redirect? Upgrade | <1.19.0 |
@builder.io/qwik-city is a The meta-framework for Qwik. Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | <1.19.0 |