diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md new file mode 100644 index 00000000..3b434101 --- /dev/null +++ b/.github/pull_request_template.md @@ -0,0 +1,24 @@ +## Goal + + +## Changes + +- +- +- + +## Testing + +- +- + +## Artifacts & Screenshots + + + +--- + +## Checklist +- [ ] PR title is clear and descriptive +- [ ] Documentation updated if needed +- [ ] No secrets or large temporary files committed \ No newline at end of file diff --git a/.gitignore b/.gitignore new file mode 100644 index 00000000..8b56d602 --- /dev/null +++ b/.gitignore @@ -0,0 +1,7 @@ + +labs/lab5/semgrep/juice-shop/ + +labs/lab5/semgrep/juice-shop/ + +cosign.exe +labs/lab8/signing/cosign.key diff --git a/.gitleaks.toml b/.gitleaks.toml new file mode 100644 index 00000000..b2e2d0bb --- /dev/null +++ b/.gitleaks.toml @@ -0,0 +1,11 @@ +title = "Gitleaks Config" + +[extend] +useDefault = true + +[allowlist] +description = "Lab11 self-signed localhost TLS certificate - intentional lab artifact" +paths = [ + '''labs/lab11/reverse-proxy/certs/localhost\.key''', + '''labs/lab11/reverse-proxy/certs/localhost\.crt''' +] diff --git a/labs/lab10/imports/import-grype-vuln-results.json.json b/labs/lab10/imports/import-grype-vuln-results.json.json new file mode 100644 index 00000000..720b8dfa --- /dev/null +++ b/labs/lab10/imports/import-grype-vuln-results.json.json @@ -0,0 +1 @@ +{"minimum_severity":"Info","active":false,"verified":false,"endpoint_to_add":null,"product_type_name":"Engineering","product_name":"Juice Shop","engagement_name":"Labs Security Testing","auto_create_context":true,"deduplication_on_engagement":false,"lead":null,"push_to_jira":false,"api_scan_configuration":null,"create_finding_groups_for_all_findings":true,"test_id":4,"engagement_id":1,"product_id":1,"product_type_id":2,"statistics":{"after":{"info":{"active":12,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":12},"low":{"active":3,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":3},"medium":{"active":31,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":31},"high":{"active":52,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":52},"critical":{"active":11,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":11},"total":{"active":109,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":109}}},"apply_tags_to_findings":false,"apply_tags_to_endpoints":false,"scan_type":"Anchore Grype","close_old_findings":false,"close_old_findings_product_scope":false,"test":4} \ No newline at end of file diff --git a/labs/lab10/imports/import-nuclei-results.json.json b/labs/lab10/imports/import-nuclei-results.json.json new file mode 100644 index 00000000..9d70709c --- /dev/null +++ b/labs/lab10/imports/import-nuclei-results.json.json @@ -0,0 +1 @@ +{"minimum_severity":"Info","active":false,"verified":false,"endpoint_to_add":null,"product_type_name":"Engineering","product_name":"Juice Shop","engagement_name":"Labs Security Testing","auto_create_context":true,"deduplication_on_engagement":false,"lead":null,"push_to_jira":false,"api_scan_configuration":null,"create_finding_groups_for_all_findings":true,"test_id":3,"engagement_id":1,"product_id":1,"product_type_id":2,"statistics":{"after":{"info":{"active":23,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":23},"low":{"active":1,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":1},"medium":{"active":1,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":1},"high":{"active":0,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":0},"critical":{"active":0,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":0},"total":{"active":25,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":25}}},"apply_tags_to_findings":false,"apply_tags_to_endpoints":false,"scan_type":"Nuclei Scan","close_old_findings":false,"close_old_findings_product_scope":false,"test":3} \ No newline at end of file diff --git a/labs/lab10/imports/import-semgrep-results.json.json b/labs/lab10/imports/import-semgrep-results.json.json new file mode 100644 index 00000000..759d255d --- /dev/null +++ b/labs/lab10/imports/import-semgrep-results.json.json @@ -0,0 +1 @@ +{"minimum_severity":"Info","active":false,"verified":false,"endpoint_to_add":null,"product_type_name":"Engineering","product_name":"Juice Shop","engagement_name":"Labs Security Testing","auto_create_context":true,"deduplication_on_engagement":false,"lead":null,"push_to_jira":false,"api_scan_configuration":null,"create_finding_groups_for_all_findings":true,"test_id":2,"engagement_id":1,"product_id":1,"product_type_id":2,"statistics":{"after":{"info":{"active":0,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":0},"low":{"active":0,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":0},"medium":{"active":18,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":18},"high":{"active":7,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":7},"critical":{"active":0,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":0},"total":{"active":25,"verified":0,"duplicate":0,"false_p":0,"out_of_scope":0,"is_mitigated":0,"risk_accepted":0,"total":25}}},"pro":["Did you know, Pro has an automated no-code connector for Semgrep JSON Report? Try today for free or email us at hello@defectdojo.com"],"apply_tags_to_findings":false,"apply_tags_to_endpoints":false,"scan_type":"Semgrep JSON Report","close_old_findings":false,"close_old_findings_product_scope":false,"test":2} \ No newline at end of file diff --git a/labs/lab10/imports/import-zap-report-noauth.json.json b/labs/lab10/imports/import-zap-report-noauth.json.json new file mode 100644 index 00000000..207345f6 --- /dev/null +++ b/labs/lab10/imports/import-zap-report-noauth.json.json @@ -0,0 +1 @@ +{"message":"['Internal error: Wrong file format, please use xml.']","pro":["Pro comes with support. Try today for free or email us at hello@defectdojo.com"]} \ No newline at end of file diff --git a/labs/lab10/report/dojo-report.html b/labs/lab10/report/dojo-report.html new file mode 100644 index 00000000..48c22782 --- /dev/null +++ b/labs/lab10/report/dojo-report.html @@ -0,0 +1,52327 @@ + + +
+ +| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 0.82% + / + 74.10% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| crypto-js | + + +3.3.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/crypto-js/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: crypto-js PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard
+Related Vulnerability Description: crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
+Matcher: javascript-matcher
+Package URL: pkg:npm/crypto-js@3.3.0
+ + + + + + + + + + + +Upgrade to version: 4.2.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-xwcq-pm8m-c4vf
+Vulnerability URLs:
+- https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf
+- https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a
+- https://nvd.nist.gov/vuln/detail/CVE-2023-46233
+- https://lists.debian.org/debian-lts-announce/2023/11/msg00025.html
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-46233
+Related Vulnerability URLs:
+- https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a
+- https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf
+- https://lists.debian.org/debian-lts-announce/2023/11/msg00025.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 2.44% + / + 84.89% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Prototype Pollution in lodash
+Related Vulnerability Description: Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash@2.4.2
+ + + + + + + + + + + +Upgrade to version: 4.17.12
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-jf85-cpcp-j695
+Vulnerability URLs:
+- https://github.com/lodash/lodash/pull/4336
+- https://nvd.nist.gov/vuln/detail/CVE-2019-10744
+- https://snyk.io/vuln/SNYK-JS-LODASH-450202
+- https://access.redhat.com/errata/RHSA-2019:3024
+- https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS
+- https://www.oracle.com/security-alerts/cpujan2021.html
+- https://www.oracle.com/security-alerts/cpuoct2020.html
+- https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
+- https://security.netapp.com/advisory/ntap-20191004-0005
+- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2019-10744.yml
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-10744
+Related Vulnerability URLs:
+- https://access.redhat.com/errata/RHSA-2019:3024
+- https://security.netapp.com/advisory/ntap-20191004-0005/
+- https://snyk.io/vuln/SNYK-JS-LODASH-450202
+- https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
+- https://www.oracle.com/security-alerts/cpujan2021.html
+- https://www.oracle.com/security-alerts/cpuoct2020.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 5.00% + / + 89.50% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: vm2 Sandbox Escape vulnerability
+Related Vulnerability Description: vm2 is an advanced vm/sandbox for Node.js. The library contains critical security issues and should not be used for production. The maintenance of the project has been discontinued. In vm2 for versions up to 3.9.19,Promisehandler sanitization can be bypassed with the@@speciesaccessor property allowing attackers to escape the sandbox and run arbitrary code, potentially allowing remote code execution inside the context of vm2 sandbox. Version 3.10.0 contains a patch for the issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/vm2@3.9.17
+ + + + + + + + + + + +Upgrade to version: 3.10.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-cchq-frgv-rjh5
+Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
+- https://nvd.nist.gov/vuln/detail/CVE-2023-37466
+- https://gist.github.com/leesh3288/f693061e6523c97274ad5298eb2c74e9
+- https://security.netapp.com/advisory/ntap-20230831-0007
+- https://security.netapp.com/advisory/ntap-20241108-0002
+- https://github.com/patriksimek/vm2/commit/d9a1fde8ec5a5a9c9e5a69bf91d703950859d744
+- https://github.com/patriksimek/vm2/releases/tag/v3.10.0
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-37466
+Related Vulnerability URLs:
+- https://github.com/patriksimek/vm2/commit/d9a1fde8ec5a5a9c9e5a69bf91d703950859d744
+- https://github.com/patriksimek/vm2/releases/tag/v3.10.0
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
+- https://security.netapp.com/advisory/ntap-20241108-0002/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 32.47% + / + 96.75% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Verification Bypass in jsonwebtoken
+Related Vulnerability Description: In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS family).
+Matcher: javascript-matcher
+Package URL:* pkg:npm/jsonwebtoken@0.4.0
+ + + + + + + + + + + +Upgrade to version: 4.2.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-c7hr-j4mj-j2w6
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+- https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+- https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+- https://www.npmjs.com/advisories/17
+- https://www.timmclean.net/2015/02/25/jwt-alg-none.html
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+Related Vulnerability URLs:
+- https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+- https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+- https://nodesecurity.io/advisories/17
+- https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 32.47% + / + 96.75% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Verification Bypass in jsonwebtoken
+Related Vulnerability Description: In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS family).
+Matcher: javascript-matcher
+Package URL:* pkg:npm/jsonwebtoken@0.1.0
+ + + + + + + + + + + +Upgrade to version: 4.2.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-c7hr-j4mj-j2w6
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+- https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+- https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+- https://www.npmjs.com/advisories/17
+- https://www.timmclean.net/2015/02/25/jwt-alg-none.html
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+Related Vulnerability URLs:
+- https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+- https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+- https://nodesecurity.io/advisories/17
+- https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 39.23% + / + 97.19% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: vm2 Sandbox Escape vulnerability
+Related Vulnerability Description: vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
+Matcher: javascript-matcher
+Package URL: pkg:npm/vm2@3.9.17
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-g644-9gfx-q4q4
+Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4
+- https://nvd.nist.gov/vuln/detail/CVE-2023-37903
+- https://security.netapp.com/advisory/ntap-20230831-0007
+- https://security.netapp.com/advisory/ntap-20241108-0002
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-37903
+Related Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4
+- https://security.netapp.com/advisory/ntap-20230831-0007/
+- https://security.netapp.com/advisory/ntap-20241108-0002/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 69.88% + / + 98.63% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: vm2 Sandbox Escape vulnerability
+Related Vulnerability Description: vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification ofProxy. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version3.9.18ofvm2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+Matcher: javascript-matcher
+Package URL: pkg:npm/vm2@3.9.17
+ + + + + + + + + + + +Upgrade to version: 3.9.18
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-whpj-8f3w-67p5
+Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
+- https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf
+- https://github.com/patriksimek/vm2/releases/tag/3.9.18
+- https://nvd.nist.gov/vuln/detail/CVE-2023-32314
+- https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-32314
+Related Vulnerability URLs:
+- https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
+- https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf
+- https://github.com/patriksimek/vm2/releases/tag/3.9.18
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 74 + + | + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +vm2: Sandbox Escape
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.9.18vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of
Proxy. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version3.9.18ofvm2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
+ + + + + +3.9.18
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2023-32314
+https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac
+https://github.com/patriksimek/vm2
+https://github.com/patriksimek/vm2/commit/d88105f99752305c5b8a77b63ddee3ec86912daf
+https://github.com/patriksimek/vm2/releases/tag/3.9.18
+https://github.com/patriksimek/vm2/security/advisories/GHSA-whpj-8f3w-67p5
+https://nvd.nist.gov/vuln/detail/CVE-2023-32314
+https://www.cve.org/CVERecord?id=CVE-2023-32314
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| marsdb | + + +0.6.11 | + + +
| File Path | +
|---|
| juice-shop/node_modules/marsdb/package.json | +
+ + + + + + +Command Injection in marsdb
+
+Target: Node.js
+Type: node-pkg
+Fixed version:All versions of
+marsdbare vulnerable to Command Injection. In theDocumentMatcherclass, selectors on$whereclauses are passed to a Function constructor unsanitized. This allows attackers to run arbitrary commands in the system when the function is executed.Recommendation
+No fix is currently available. Consider using an alternative package until a fix is made available.
+ + + + + + + +affected
+ + + + + + + +https://github.com/bkimminich/juice-shop/issues/1173
+https://www.npmjs.com/advisories/1122
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1321 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
+ + +nodejs-lodash: prototype pollution in defaultsDeep function leading to modifying properties
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.17.12Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.
+ + + + + +4.17.12
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2019:3024
+https://access.redhat.com/security/cve/CVE-2019-10744
+https://github.com/advisories/GHSA-jf85-cpcp-j695
+https://github.com/lodash/lodash/pull/4336
+https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2019-10744.yml
+https://nvd.nist.gov/vuln/detail/CVE-2019-10744
+https://security.netapp.com/advisory/ntap-20191004-0005
+https://security.netapp.com/advisory/ntap-20191004-0005/
+https://snyk.io/vuln/SNYK-JS-LODASH-450202
+https://support.f5.com/csp/article/K47105354
+https://support.f5.com/csp/article/K47105354?utm_source=f5support&%3Butm_medium=RSS
+https://support.f5.com/csp/article/K47105354?utm_source=f5support&utm_medium=RSS
+https://www.cve.org/CVERecord?id=CVE-2019-10744
+https://www.npmjs.com/advisories/1065
+https://www.oracle.com/security-alerts/cpujan2021.html
+https://www.oracle.com/security-alerts/cpuoct2020.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +nodejs-jsonwebtoken: verification step bypass with an altered token
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.2.2In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
+ + + + + +4.2.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2015-9235
+https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries
+https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+https://github.com/advisories/GHSA-c7hr-j4mj-j2w6
+https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+https://nodesecurity.io/advisories/17
+https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+https://www.cve.org/CVERecord?id=CVE-2015-9235
+https://www.npmjs.com/advisories/17
+https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +nodejs-jsonwebtoken: verification step bypass with an altered token
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.2.2In jsonwebtoken node module before 4.2.2 it is possible for an attacker to bypass verification when a token digitally signed with an asymmetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family).
+ + + + + +4.2.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2015-9235
+https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries
+https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+https://github.com/advisories/GHSA-c7hr-j4mj-j2w6
+https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+https://nodesecurity.io/advisories/17
+https://nvd.nist.gov/vuln/detail/CVE-2015-9235
+https://www.cve.org/CVERecord?id=CVE-2015-9235
+https://www.npmjs.com/advisories/17
+https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 94 + + | + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +vm2 has a Sandbox Escape
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.10.2vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2,
Promise.prototype.thenPromise.prototype.catchcallback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setup-sandbox.js, the callback function oflocalPromise.prototype.thenis sanitized, butglobalPromise.prototype.thenis not sanitized. The return value of async functions isglobalPromiseobject. Version 3.10.2 fixes the issue.
+ + + + + +3.10.2
+ + + + + + + +fixed
+ + + + + + + +https://github.com/patriksimek/vm2
+https://github.com/patriksimek/vm2/commit/4b009c2d4b1131c01810c1205e641d614c322a29
+https://github.com/patriksimek/vm2/releases/tag/v3.10.2
+https://github.com/patriksimek/vm2/security/advisories/GHSA-99p7-6v5w-7xg8
+https://nvd.nist.gov/vuln/detail/CVE-2026-22709
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 328 + + | + + +
| Component | + + +Version | + + +
|---|---|
| crypto-js | + + +3.3.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/crypto-js/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
+ + +crypto-js: PBKDF2 1,000 times weaker than specified in 1993 and 1.3M times weaker than current standard
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.2.0crypto-js is a JavaScript library of crypto standards. Prior to version 4.2.0, crypto-js PBKDF2 is 1,000 times weaker than originally specified in 1993, and at least 1,300,000 times weaker than current industry standard. This is because it both defaults to SHA1, a cryptographic hash algorithm considered insecure since at least 2005, and defaults to one single iteration, a 'strength' or 'difficulty' value specified at 1,000 when specified in 1993. PBKDF2 relies on iteration count as a countermeasure to preimage and collision attacks. If used to protect passwords, the impact is high. If used to generate signatures, the impact is high. Version 4.2.0 contains a patch for this issue. As a workaround, configure crypto-js to use SHA256 with at least 250,000 iterations.
+ + + + + +4.2.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2023-46233
+https://github.com/brix/crypto-js
+https://github.com/brix/crypto-js/commit/421dd538b2d34e7c24a5b72cc64dc2b9167db40a
+https://github.com/brix/crypto-js/security/advisories/GHSA-xwcq-pm8m-c4vf
+https://lists.debian.org/debian-lts-announce/2023/11/msg00025.html
+https://nvd.nist.gov/vuln/detail/CVE-2023-46233
+https://ubuntu.com/security/notices/USN-6753-1
+https://www.cve.org/CVERecord?id=CVE-2023-46233
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 787 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +openssl: OpenSSL: Remote code execution or Denial of Service via oversized Initialization Vector in CMS parsing
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
+
+crafted AEAD parameters can trigger a stack buffer overflow.Impact summary: A stack buffer overflow may lead to a crash, causing Denial
+
+of Service, or potentially remote code execution.When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as
+
+AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is
+copied into a fixed-size stack buffer without verifying that its length fits
+the destination. An attacker can supply a crafted CMS message with an
+oversized IV, causing a stack-based out-of-bounds write before any
+authentication or tag verification occurs.Applications and services that parse untrusted CMS or PKCS#7 content using
+
+AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable.
+Because the overflow occurs prior to authentication, no valid key material
+is required to trigger it. While exploitability to remote code execution
+depends on platform and toolchain mitigations, the stack-based write
+primitive represents a severe risk.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
+
+issue, as the CMS implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.
+OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2026/01/27/10
+https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-15467
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703
+https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9
+https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3
+https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e
+https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc
+https://linux.oracle.com/cve/CVE-2025-15467.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-15467
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://www.cve.org/CVERecord?id=CVE-2025-15467
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| marsdb | + + +0.6.11 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/marsdb/package.json | +
+ + + + + + + + + + + + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Command Injection in marsdb
+Matcher: javascript-matcher
+Package URL: pkg:npm/marsdb@0.6.11
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-5mrr-rgp6-x4gr
+Vulnerability URLs:
+- https://github.com/bkimminich/juice-shop/issues/1173
+- https://www.npmjs.com/advisories/1122
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 78 + + | + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + +vm2: custom inspect function allows attackers to escape the sandbox and run arbitrary code
+
+Target: Node.js
+Type: node-pkg
+Fixed version:vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2023-37903
+https://github.com/patriksimek/vm2
+https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4
+https://nvd.nist.gov/vuln/detail/CVE-2023-37903
+https://security.netapp.com/advisory/ntap-20230831-0007
+https://security.netapp.com/advisory/ntap-20230831-0007/
+https://security.netapp.com/advisory/ntap-20241108-0002
+https://security.netapp.com/advisory/ntap-20241108-0002/
+https://www.cve.org/CVERecord?id=CVE-2023-37903
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Critical + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 94 + + | + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +vm2: Promise handler sanitization can be bypassed allowing attackers to escape the sandbox and run arbitrary code
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.10.0vm2 is an advanced vm/sandbox for Node.js. The library contains critical security issues and should not be used for production. The maintenance of the project has been discontinued. In vm2 for versions up to 3.9.19,
Promisehandler sanitization can be bypassed with the@@speciesaccessor property allowing attackers to escape the sandbox and run arbitrary code, potentially allowing remote code execution inside the context of vm2 sandbox. Version 3.10.0 contains a patch for the issue.
+ + + + + +3.10.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2023-37466
+https://gist.github.com/leesh3288/f693061e6523c97274ad5298eb2c74e9
+https://github.com/patriksimek/vm2
+https://github.com/patriksimek/vm2/commit/d9a1fde8ec5a5a9c9e5a69bf91d703950859d744
+https://github.com/patriksimek/vm2/releases/tag/v3.10.0
+https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5
+https://nvd.nist.gov/vuln/detail/CVE-2023-37466
+https://security.netapp.com/advisory/ntap-20230831-0007
+https://security.netapp.com/advisory/ntap-20241108-0002
+https://security.netapp.com/advisory/ntap-20241108-0002/
+https://www.cve.org/CVERecord?id=CVE-2023-37466
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 0.01% + / + 1.67% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: nvd:cpe
+Vulnerability Description: A flaw in Node.jsΓÇÖs Permissions model allows attackers to bypass--allow-fs-readand--allow-fs-writerestrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
+This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
+Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-55130
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 0.03% + / + 8.60% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: vm2 has a Sandbox Escape
+Related Vulnerability Description: vm2 is an open source vm/sandbox for Node.js. In vm2 prior to version 3.10.2,Promise.prototype.thenPromise.prototype.catchcallback sanitization can be bypassed. This allows attackers to escape the sandbox and run arbitrary code. In lib/setup-sandbox.js, the callback function oflocalPromise.prototype.thenis sanitized, butglobalPromise.prototype.thenis not sanitized. The return value of async functions isglobalPromiseobject. Version 3.10.2 fixes the issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/vm2@3.9.17
+ + + + + + + + + + + +Upgrade to version: 3.10.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-99p7-6v5w-7xg8
+Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-99p7-6v5w-7xg8
+- https://github.com/patriksimek/vm2/commit/4b009c2d4b1131c01810c1205e641d614c322a29
+- https://github.com/patriksimek/vm2/releases/tag/v3.10.2
+- https://nvd.nist.gov/vuln/detail/CVE-2026-22709
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-22709
+Related Vulnerability URLs:
+- https://github.com/patriksimek/vm2/commit/4b009c2d4b1131c01810c1205e641d614c322a29
+- https://github.com/patriksimek/vm2/releases/tag/v3.10.2
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-99p7-6v5w-7xg8
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Critical + + + | ++ 0.67% + / + 71.00% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: Parsing CMS AuthEnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
+Related Vulnerability Description: Issue summary: Parsing CMS AuthEnvelopedData message with maliciously
+crafted AEAD parameters can trigger a stack buffer overflow.Impact summary: A stack buffer overflow may lead to a crash, causing Denial
+
+of Service, or potentially remote code execution.When parsing CMS AuthEnvelopedData structures that use AEAD ciphers such as
+
+AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is
+copied into a fixed-size stack buffer without verifying that its length fits
+the destination. An attacker can supply a crafted CMS message with an
+oversized IV, causing a stack-based out-of-bounds write before any
+authentication or tag verification occurs.Applications and services that parse untrusted CMS or PKCS#7 content using
+
+AEAD ciphers (e.g., S/MIME AuthEnvelopedData with AES-GCM) are vulnerable.
+Because the overflow occurs prior to authentication, no valid key material
+is required to trigger it. While exploitability to remote code execution
+depends on platform and toolchain mitigations, the stack-based write
+primitive represents a severe risk.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
+
+issue, as the CMS implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.
+OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-15467
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-15467
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/2c8f0e5fa9b6ee5508a0349e4572ddb74db5a703
+- https://github.com/openssl/openssl/commit/5f26d4202f5b89664c5c3f3c62086276026ba9a9
+- https://github.com/openssl/openssl/commit/6ced0fe6b10faa560e410e3ee8d6c82f06c65ea3
+- https://github.com/openssl/openssl/commit/ce39170276daec87f55c39dad1f629b56344429e
+- https://github.com/openssl/openssl/commit/d0071a0799f20cc8101730145349ed4487c268dc
+- https://openssl-library.org/news/secadv/20260127.txt
+- http://www.openwall.com/lists/oss-security/2026/01/27/10
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +Verification Bypass
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=4.2.2It is possible for an attacker to bypass verification when "a token digitally signed with an asymetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family)" [1]
+ + + + + ++=4.2.2
+
+ + + + + + + +fixed
+ + + + + + + +https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 11 | + +
| File Path | +
|---|
| /src/data/static/codefixes/dbSchemaChallenge_3.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 6 | + +
| File Path | +
|---|
| /src/data/static/codefixes/unionSqlInjectionChallenge_1.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 10 | + +
| File Path | +
|---|
| /src/data/static/codefixes/unionSqlInjectionChallenge_3.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 34 | + +
| File Path | +
|---|
| /src/routes/login.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 23 | + +
| File Path | +
|---|
| /src/routes/search.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 95 + + | + + +
| Line Number | + +
|---|
| 62 | + +
| File Path | +
|---|
| /src/routes/userProfile.ts | +
+ + + + + + + + + + + + +Result message: Found data from an Express or Next web request flowing to
eval. If this data is user-controllable this can lead to execution of arbitrary system commands in the context of your application process. Avoidevalwhenever possible.
+ + + + + + + +https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/eval
+https://nodejs.org/api/child_process.html#child_processexeccommand-options-callback
+https://www.stackhawk.com/blog/nodejs-command-injection-examples-and-prevention/
+https://ckarande.gitbooks.io/owasp-nodegoat-tutorial/content/tutorial/a1_-_server_side_js_injection.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 86.50% + / + 99.39% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| ip | + + +2.0.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/ip/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: ip SSRF improper categorization in isPublic
+Related Vulnerability Description: The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
+Matcher: javascript-matcher
+Package URL: pkg:npm/ip@2.0.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-2p57-rm9w-gvfp
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2024-29415
+- https://github.com/indutny/node-ip/issues/150
+- https://github.com/indutny/node-ip/pull/143
+- https://github.com/indutny/node-ip/pull/144
+- https://security.netapp.com/advisory/ntap-20250117-0010
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-29415
+Related Vulnerability URLs:
+- https://github.com/indutny/node-ip/issues/150
+- https://github.com/indutny/node-ip/pull/143
+- https://github.com/indutny/node-ip/pull/144
+- https://security.netapp.com/advisory/ntap-20250117-0010/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 2.61% + / + 85.38% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash.set | + + +4.3.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/lodash.set/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Prototype Pollution in lodash
+Related Vulnerability Description: Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash.set@4.3.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-p6mc-m468-83gw
+Vulnerability URLs:
+- https://github.com/lodash/lodash/issues/4744
+- https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12
+- https://nvd.nist.gov/vuln/detail/CVE-2020-8203
+- https://hackerone.com/reports/712065
+- https://github.com/lodash/lodash/issues/4874
+- https://github.com/github/advisory-database/pull/2884
+- https://hackerone.com/reports/864701
+- https://github.com/lodash/lodash/wiki/Changelog#v41719
+- https://web.archive.org/web/20210914001339/https://github.com/lodash/lodash/issues/4744
+- https://security.netapp.com/advisory/ntap-20200724-0006
+- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2020-8203.yml
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2020-8203
+Related Vulnerability URLs:
+- https://github.com/lodash/lodash/issues/4874
+- https://hackerone.com/reports/712065
+- https://security.netapp.com/advisory/ntap-20200724-0006/
+- https://www.oracle.com//security-alerts/cpujul2021.html
+- https://www.oracle.com/security-alerts/cpuApr2021.html
+- https://www.oracle.com/security-alerts/cpuapr2022.html
+- https://www.oracle.com/security-alerts/cpujan2022.html
+- https://www.oracle.com/security-alerts/cpuoct2021.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 1.67% + / + 81.85% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Path Traversal: 'dir/../../filename' in moment.locale
+Related Vulnerability Description: Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
+Matcher: javascript-matcher
+Package URL: pkg:npm/moment@2.0.0
+ + + + + + + + + + + +Upgrade to version: 2.29.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8hfj-j24r-96c4
+Vulnerability URLs:
+- https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
+- https://nvd.nist.gov/vuln/detail/CVE-2022-24785
+- https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
+- https://www.tenable.com/security/tns-2022-09
+- https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5
+- https://security.netapp.com/advisory/ntap-20220513-0006
+- https://security.netapp.com/advisory/ntap-20241108-0002
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-24785
+Related Vulnerability URLs:
+- https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
+- https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
+- https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/
+- https://security.netapp.com/advisory/ntap-20220513-0006/
+- https://www.tenable.com/security/tns-2022-09
+- https://security.netapp.com/advisory/ntap-20241108-0002/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.74% + / + 72.60% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Command Injection in lodash
+Related Vulnerability Description: Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash@2.4.2
+ + + + + + + + + + + +Upgrade to version: 4.17.21
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-35jh-r3h4-6jhm
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2021-23337
+- https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
+- https://snyk.io/vuln/SNYK-JS-LODASH-1040724
+- https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851
+- https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
+- https://www.oracle.com//security-alerts/cpujul2021.html
+- https://www.oracle.com/security-alerts/cpuoct2021.html
+- https://www.oracle.com/security-alerts/cpujan2022.html
+- https://www.oracle.com/security-alerts/cpujul2022.html
+- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
+- https://security.netapp.com/advisory/ntap-20210312-0006
+- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2021-23337.yml
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2021-23337
+Related Vulnerability URLs:
+- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
+- https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
+- https://security.netapp.com/advisory/ntap-20210312-0006/
+- https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
+- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
+- https://snyk.io/vuln/SNYK-JS-LODASH-1040724
+- https://www.oracle.com//security-alerts/cpujul2021.html
+- https://www.oracle.com/security-alerts/cpujan2022.html
+- https://www.oracle.com/security-alerts/cpujul2022.html
+- https://www.oracle.com/security-alerts/cpuoct2021.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.54% + / + 67.21% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| ws | + + +7.4.6 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/engine.io/node_modules/ws/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: ws affected by a DoS when handling a request with many HTTP headers
+Related Vulnerability Description: ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
+Matcher: javascript-matcher
+Package URL: pkg:npm/ws@7.4.6
+ + + + + + + + + + + +Upgrade to version: 7.5.10
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3h5v-q93c-6h6q
+Vulnerability URLs:
+- https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
+- https://github.com/websockets/ws/issues/2230
+- https://github.com/websockets/ws/pull/2231
+- https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f
+- https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e
+- https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c
+- https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-37890
+Related Vulnerability URLs:
+- https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f
+- https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e
+- https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c
+- https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63
+- https://github.com/websockets/ws/issues/2230
+- https://github.com/websockets/ws/pull/2231
+- https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
+- https://nodejs.org/api/http.html#servermaxheaderscount
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.45% + / + 63.11% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Sanitize-html Vulnerable To REDoS Attacks
+Related Vulnerability Description: The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 2.7.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-cgfm-xwp7-2cvr
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2022-25887
+- https://github.com/apostrophecms/sanitize-html/pull/557
+- https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102
+- https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-25887
+Related Vulnerability URLs:
+- https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c
+- https://github.com/apostrophecms/sanitize-html/pull/557
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102
+- https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.34% + / + 56.62% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Prototype Pollution in lodash
+Related Vulnerability Description: A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash@2.4.2
+ + + + + + + + + + + +Upgrade to version: 4.17.11
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-4xc9-xhrj-v574
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2018-16487
+- https://hackerone.com/reports/380873
+- https://github.com/lodash/lodash/commit/90e6199a161b6445b01454517b40ef65ebecd2ad
+- https://security.netapp.com/advisory/ntap-20190919-0004
+- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-16487.yml
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2018-16487
+Related Vulnerability URLs:
+- https://hackerone.com/reports/380873
+- https://security.netapp.com/advisory/ntap-20190919-0004/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.31% + / + 53.92% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Regular Expression Denial of Service in moment
+Related Vulnerability Description: The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.
+Matcher: javascript-matcher
+Package URL: pkg:npm/moment@2.0.0
+ + + + + + + + + + + +Upgrade to version: 2.19.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-446m-mv8f-q348
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2017-18214
+- https://github.com/moment/moment/issues/4163
+- https://github.com/moment/moment/pull/4326
+- https://www.npmjs.com/advisories/532
+- https://www.tenable.com/security/tns-2019-02
+- https://github.com/moment/moment/commit/69ed9d44957fa6ab12b73d2ae29d286a857b80eb
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2017-18214
+Related Vulnerability URLs:
+- https://github.com/moment/moment/issues/4163
+- https://nodesecurity.io/advisories/532
+- https://www.tenable.com/security/tns-2019-02
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.22% + / + 44.92% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| braces | + + +2.3.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/braces/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Uncontrolled resource consumption in braces
+Related Vulnerability Description: The NPM packagebraces, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. Inlib/parse.js,if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
+Matcher: javascript-matcher
+Package URL: pkg:npm/braces@2.3.2
+ + + + + + + + + + + +Upgrade to version: 3.0.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-grv7-fg5c-xmjg
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2024-4068
+- https://github.com/micromatch/braces/issues/35
+- https://devhub.checkmarx.com/cve-details/CVE-2024-4068
+- https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
+- https://github.com/micromatch/braces/pull/37
+- https://github.com/micromatch/braces/pull/40
+- https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-4068
+Related Vulnerability URLs:
+- https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
+- https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
+- https://github.com/micromatch/braces/issues/35
+- https://github.com/micromatch/braces/pull/37
+- https://github.com/micromatch/braces/pull/40
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.22% + / + 44.60% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| express-jwt | + + +0.1.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Authorization bypass in express-jwt
+Related Vulnerability Description: In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this vulnerability if all of the following conditions apply: - You are using express-jwt - You do not have algorithms configured in your express-jwt configuration. - You are using libraries such as jwks-rsa as the secret. You can fix this by specifying algorithms in the express-jwt configuration. See linked GHSA for example. This is also fixed in version 6.0.0.
+Matcher: javascript-matcher
+Package URL: pkg:npm/express-jwt@0.1.3
+ + + + + + + + + + + +Upgrade to version: 6.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-6g6m-m6h5-w9gf
+Vulnerability URLs:
+- https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf
+- https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef
+- https://nvd.nist.gov/vuln/detail/CVE-2020-15084
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2020-15084
+Related Vulnerability URLs:
+- https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef
+- https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.20% + / + 41.48% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| http-cache-semantics | + + +3.8.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/http-cache-semantics/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: http-cache-semantics vulnerable to Regular Expression Denial of Service
+Related Vulnerability Description: This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
+Matcher: javascript-matcher
+Package URL: pkg:npm/http-cache-semantics@3.8.1
+ + + + + + + + + + + +Upgrade to version: 4.1.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-rc47-6667-2j5j
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2022-25881
+- https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
+- https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
+- https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74
+- https://security.netapp.com/advisory/ntap-20230622-0008
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-25881
+Related Vulnerability URLs:
+- https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83
+- https://security.netapp.com/advisory/ntap-20230622-0008/
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
+- https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.08% + / + 24.62% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| qs | + + +6.13.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/qs/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+
+Vulnerability Description: qs's arrayLimit bypass in its bracket notation allows DoS via memory exhaustion
+Related Vulnerability Description: Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.Summary
+The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations.
+Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than parameterLimit regardless of arrayLimit, because each a[]=valueconsumes one parameter slot. The severity has been reduced accordingly.
+Details
+The arrayLimit option only checked limits for indexed notation (a[0]=1&a[1]=2) but did not enforce it for bracket notation (a[]=1&a[]=2).
+Vulnerable code (lib/parse.js:159-162):
+if (root === '[]' && options.parseArrays) {
+
+ obj = utils.combine([], leaf); // No arrayLimit check
+}Working code (lib/parse.js:175):
+else if (index <= options.arrayLimit) { // Limit checked here
+
+ obj = [];
+ obj[index] = leaf;
+}The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays.
+PoC
+const qs = require('qs');
+
+const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 });
+console.log(result.a.length); // Output: 6 (should be max 5)Note on parameterLimit interaction: The original advisory's "DoS demonstration" claimed a length of 10,000, but parameterLimit (default: 1000) caps parsing to 1,000 parameters. With default options, the actual output is 1,000, not 10,000.
+Impact
+Consistency bug in arrayLimit enforcement. With default parameterLimit, the practical DoS risk is negligible since parameterLimit already caps the total number of parsed parameters (and thus array elements from bracket notation). The risk increases only when parameterLimit is explicitly set to a very high value.
+Matcher: javascript-matcher
+Package URL: pkg:npm/qs@6.13.0
+ + + + + + + + + + + +Upgrade to version: 6.14.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-6rw7-vpxm-498p
+Vulnerability URLs:
+- https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
+- https://nvd.nist.gov/vuln/detail/CVE-2025-15284
+- https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-15284
+Related Vulnerability URLs:
+- https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
+- https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.08% + / + 23.74% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/multer/package.json | +
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Multer vulnerable to Denial of Service via unhandled exception
+Related Vulnerability Description: Multer is a node.js middleware for handlingmultipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to2.0.1to receive a patch. No known workarounds are available.
+Matcher: javascript-matcher
+Package URL: pkg:npm/multer@1.4.5-lts.2
+ + + + + + + + + + + +Upgrade to version: 2.0.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-g5hg-p3ph-g8qg
+Vulnerability URLs:
+- https://github.com/expressjs/multer/security/advisories/GHSA-g5hg-p3ph-g8qg
+- https://nvd.nist.gov/vuln/detail/CVE-2025-48997
+- https://github.com/expressjs/multer/issues/1233
+- https://github.com/expressjs/multer/pull/1256
+- https://github.com/expressjs/multer/commit/35a3272b611945155e046dd5cef11088587635e9
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-48997
+Related Vulnerability URLs:
+- https://github.com/expressjs/multer/commit/35a3272b611945155e046dd5cef11088587635e9
+- https://github.com/expressjs/multer/issues/1233
+- https://github.com/expressjs/multer/pull/1256
+- https://github.com/expressjs/multer/security/advisories/GHSA-g5hg-p3ph-g8qg
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.07% + / + 21.98% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken unrestricted key type could lead to legacy keys usage
+Related Vulnerability Description: Versions<=8.5.1ofjsonwebtokenlibrary could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, youΓÇÖll need to set theallowInvalidAsymmetricKeyTypesoption totruein thesign()and/orverify()functions.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.1.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8cf7-32gw-wr33
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.07% + / + 21.98% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken unrestricted key type could lead to legacy keys usage
+Related Vulnerability Description: Versions<=8.5.1ofjsonwebtokenlibrary could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, youΓÇÖll need to set theallowInvalidAsymmetricKeyTypesoption totruein thesign()and/orverify()functions.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.4.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8cf7-32gw-wr33
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.07% + / + 22.35% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| validator | + + +13.15.15 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/validator/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements
+Related Vulnerability Description: Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.
+Matcher: javascript-matcher
+Package URL: pkg:npm/validator@13.15.15
+ + + + + + + + + + + +Upgrade to version: 13.15.22
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-vghf-hv5q-vc2g
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2025-12758
+- https://github.com/validatorjs/validator.js/pull/2616
+- https://gist.github.com/koral--/ad31208b25b9e3d1e2e35f1d4d72572e
+- https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476
+- https://github.com/validatorjs/validator.js/commit/d457ecaf55b0f3d8bd379d82757425d0d13dd382
+- http://seclists.org/fulldisclosure/2026/Jan/27
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-12758
+Related Vulnerability URLs:
+- https://gist.github.com/koral--/ad31208b25b9e3d1e2e35f1d4d72572e
+- https://github.com/validatorjs/validator.js/pull/2616
+- https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476
+- http://seclists.org/fulldisclosure/2026/Jan/27
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.07% + / + 21.34% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. Impact summary: An application calling TS_RESP_verify_response() with a malformed TimeStamp Response can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2() access the signing cert attribute value without validating its type. When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed TimeStamp Response to an application that verifies timestamp responses. The TimeStamp protocol (RFC 3161) is not widely used and the impact of the exploit is just a Denial of Service. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the TimeStamp Response implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.
+Related Vulnerability Description: Issue summary: A type confusion vulnerability exists in the TimeStamp Response
+verification code where an ASN1_TYPE union member is accessed without first
+validating the type, causing an invalid or NULL pointer dereference when
+processing a malformed TimeStamp Response file.Impact summary: An application calling TS_RESP_verify_response() with a
+
+malformed TimeStamp Response can be caused to dereference an invalid or
+NULL pointer when reading, resulting in a Denial of Service.The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()
+
+access the signing cert attribute value without validating its type.
+When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory
+through the ASN1_TYPE union, causing a crash.Exploiting this vulnerability requires an attacker to provide a malformed
+
+TimeStamp Response to an application that verifies timestamp responses. The
+TimeStamp protocol (RFC 3161) is not widely used and the impact of the
+exploit is just a Denial of Service. For these reasons the issue was
+assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the TimeStamp Response implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-69420
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-69420
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9
+- https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a
+- https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e
+- https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b
+- https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.07% + / + 21.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: nvd:cpe
+
+Vulnerability Description: A malformedHTTP/2 HEADERSframe with oversized, invalidHPACKdata can cause Node.js to crash by triggering an unhandledTLSSocketerrorECONNRESET. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:+ +server.on('secureConnection', socket => { + socket.on('error', err => { + console.log(err) + }) +}) +Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-59465
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.06% + / + 18.53% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. Impact summary: A NULL pointer dereference can trigger a crash which leads to Denial of Service for an application processing PKCS#12 files. The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct parameter is NULL before dereferencing it. When called from PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can be NULL, causing a crash. The vulnerability is limited to Denial of Service and cannot be escalated to achieve code execution or memory disclosure. Exploiting this issue requires an attacker to provide a malformed PKCS#12 file to an application that processes it. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Related Vulnerability Description: Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
+dereference in the PKCS12_item_decrypt_d2i_ex() function.Impact summary: A NULL pointer dereference can trigger a crash which leads to
+
+Denial of Service for an application processing PKCS#12 files.The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
+
+parameter is NULL before dereferencing it. When called from
+PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
+be NULL, causing a crash. The vulnerability is limited to Denial of Service
+and cannot be escalated to achieve code execution or memory disclosure.Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
+
+to an application that processes it. For that reason the issue was assessed as
+Low severity according to our Security Policy.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-69421
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-69421
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
+- https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
+- https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
+- https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
+- https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.06% + / + 17.52% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. Impact summary: The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service. The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12 BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes, the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16 source byte count as the destination buffer capacity to UTF8_putc(). For BMP code points above U+07FF, UTF-8 requires three bytes, but the forwarded capacity can be just two bytes. UTF8_putc() then returns -1, and this negative value is added to the output length without validation, causing the length to become negative. The subsequent trailing NUL byte is then written at a negative offset, causing write outside of heap allocated buffer. The vulnerability is reachable via the public PKCS12_get_friendlyname() API when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a different code path that avoids this issue, PKCS12_get_friendlyname() directly invokes the vulnerable function. Exploitation requires an attacker to provide a malicious PKCS#12 file to be parsed by the application and the attacker can just trigger a one zero byte write before the allocated buffer. For that reason the issue was assessed as Low severity according to our Security Policy. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.
+Related Vulnerability Description: Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
+crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
+non-ASCII BMP code point can trigger a one byte write before the allocated
+buffer.Impact summary: The out-of-bounds write can cause a memory corruption
+
+which can have various consequences including a Denial of Service.The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12
+
+BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,
+the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16
+source byte count as the destination buffer capacity to UTF8_putc(). For BMP
+code points above U+07FF, UTF-8 requires three bytes, but the forwarded
+capacity can be just two bytes. UTF8_putc() then returns -1, and this negative
+value is added to the output length without validation, causing the
+length to become negative. The subsequent trailing NUL byte is then written
+at a negative offset, causing write outside of heap allocated buffer.The vulnerability is reachable via the public PKCS12_get_friendlyname() API
+
+when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a
+different code path that avoids this issue, PKCS12_get_friendlyname() directly
+invokes the vulnerable function. Exploitation requires an attacker to provide
+a malicious PKCS#12 file to be parsed by the application and the attacker
+can just trigger a one zero byte write before the allocated buffer.
+For that reason the issue was assessed as Low severity according to our
+Security Policy.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-69419
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-69419
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296
+- https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb
+- https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2
+- https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015
+- https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.05% + / + 16.64% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-15281
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-15281
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=33814
+- http://www.openwall.com/lists/oss-security/2026/01/20/3
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.05% + / + 14.99% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Multer vulnerable to Denial of Service via memory leaks from unclosed streams
+Related Vulnerability Description: Multer is a node.js middleware for handlingmultipart/form-data. Versions prior to 2.0.0 are vulnerable to a resource exhaustion and memory leak issue due to improper stream handling. When the HTTP request stream emits an error, the internalbusboystream is not closed, violating Node.js stream safety guidance. This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted. Users should upgrade to 2.0.0 to receive a patch. No known workarounds are available.
+Matcher: javascript-matcher
+Package URL: pkg:npm/multer@1.4.5-lts.2
+ + + + + + + + + + + +Upgrade to version: 2.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-44fp-w29j-9vj5
+Vulnerability URLs:
+- https://github.com/expressjs/multer/security/advisories/GHSA-44fp-w29j-9vj5
+- https://nvd.nist.gov/vuln/detail/CVE-2025-47935
+- https://github.com/expressjs/multer/pull/1120
+- https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-47935
+Related Vulnerability URLs:
+- https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+- https://github.com/expressjs/multer/pull/1120
+- https://github.com/expressjs/multer/security/advisories/GHSA-44fp-w29j-9vj5
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 12.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.0.5 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/replace/node_modules/minimatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
+Related Vulnerability Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+Matcher: javascript-matcher
+Package URL:* pkg:npm/minimatch@3.0.5
+ + + + + + + + + + + +Upgrade to version: 10.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3ppc-4f35-3m26
+Vulnerability URLs:
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability URLs:
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 12.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.0.8 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/grunt/node_modules/minimatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
+Related Vulnerability Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+Matcher: javascript-matcher
+Package URL:* pkg:npm/minimatch@3.0.8
+ + + + + + + + + + + +Upgrade to version: 10.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3ppc-4f35-3m26
+Vulnerability URLs:
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability URLs:
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 12.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/ignore-walk/node_modules/minimatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
+Related Vulnerability Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+Matcher: javascript-matcher
+Package URL:* pkg:npm/minimatch@3.1.2
+ + + + + + + + + + + +Upgrade to version: 10.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3ppc-4f35-3m26
+Vulnerability URLs:
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability URLs:
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 12.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +5.1.6 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/filehound/node_modules/minimatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
+Related Vulnerability Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+Matcher: javascript-matcher
+Package URL:* pkg:npm/minimatch@5.1.6
+ + + + + + + + + + + +Upgrade to version: 10.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3ppc-4f35-3m26
+Vulnerability URLs:
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability URLs:
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 12.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +9.0.5 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/glob/node_modules/minimatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: minimatch has a ReDoS via repeated wildcards with non-matching literal in pattern
+Related Vulnerability Description: minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+Matcher: javascript-matcher
+Package URL:* pkg:npm/minimatch@9.0.5
+ + + + + + + + + + + +Upgrade to version: 10.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3ppc-4f35-3m26
+Vulnerability URLs:
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+Related Vulnerability URLs:
+- https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+- https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.04% + / + 11.52% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| glob | + + +10.4.5 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/glob/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: glob CLI: Command injection via -c/--cmd executes matches with shell:true
+Related Vulnerability Description: Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.
+Matcher: javascript-matcher
+Package URL: pkg:npm/glob@10.4.5
+ + + + + + + + + + + +Upgrade to version: 10.5.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-5j98-mcp5-4vw2
+Vulnerability URLs:
+- https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2
+- https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146
+- https://nvd.nist.gov/vuln/detail/CVE-2025-64756
+- https://github.com/isaacs/node-glob/commit/1e4e297342a09f2aa0ced87fcd4a70ddc325d75f
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-64756
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-glob/commit/1e4e297342a09f2aa0ced87fcd4a70ddc325d75f
+- https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146
+- https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.03% + / + 10.43% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: nvd:cpe
+Vulnerability Description: A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server whenpskCallbackorALPNCallbackare in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
+Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-21637
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.03% + / + 8.97% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: An application trying to decrypt CMS messages encrypted using password based encryption can trigger an out-of-bounds read and write. Impact summary: This out-of-bounds read may trigger a crash which leads to Denial of Service for an application. The out-of-bounds write can cause a memory corruption which can have various consequences including a Denial of Service or Execution of attacker-supplied code. Although the consequences of a successful exploit of this vulnerability could be severe, the probability that the attacker would be able to perform it is low. Besides, password based (PWRI) encryption support in CMS messages is very rarely used. For that reason the issue was assessed as Moderate severity according to our Security Policy. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary.
+Related Vulnerability Description: Issue summary: An application trying to decrypt CMS messages encrypted using
+password based encryption can trigger an out-of-bounds read and write.Impact summary: This out-of-bounds read may trigger a crash which leads to
+
+Denial of Service for an application. The out-of-bounds write can cause
+a memory corruption which can have various consequences including
+a Denial of Service or Execution of attacker-supplied code.Although the consequences of a successful exploit of this vulnerability
+
+could be severe, the probability that the attacker would be able to
+perform it is low. Besides, password based (PWRI) encryption support in CMS
+messages is very rarely used. For that reason the issue was assessed as
+Moderate severity according to our Security Policy.The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
+issue, as the CMS implementation is outside the OpenSSL FIPS module
+boundary.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.17-1~deb12u3
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-9230
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-9230
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
+- https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
+- https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
+- https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
+- https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
+- https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
+- https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
+- https://openssl-library.org/news/secadv/20250930.txt
+- http://www.openwall.com/lists/oss-security/2025/09/30/5
+- https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.03% + / + 7.26% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar-fs | + + +2.1.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/tar-fs/package.json | +
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: tar-fs has a symlink validation bypass if destination directory is predictable with a specific tarball
+Related Vulnerability Description: tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar-fs@2.1.3
+ + + + + + + + + + + +Upgrade to version: 2.1.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-vj76-c3g6-qr5v
+Vulnerability URLs:
+- https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v
+- https://nvd.nist.gov/vuln/detail/CVE-2025-59343
+- https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09
+- https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-59343
+Related Vulnerability URLs:
+- https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09
+- https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v
+- https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.03% + / + 7.52% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
+ + +Vulnerability Namespace: nvd:cpe
+Vulnerability Description: A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using thevmmodule with the timeout option. Under specific timing conditions, buffers allocated withBuffer.allocand otherTypedArrayinstances likeUint8Arraymay contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.
+Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-55131
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.03% + / + 6.96% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: nvd:cpe
+Vulnerability Description: We have identified a bug in Node.js error handling where "Maximum call stack size exceeded" errors become uncatchable whenasync_hooks.createHook()is enabled. Instead of reachingprocess.on('uncaughtException'), the process terminates, making the crash unrecoverable. Applications that rely onAsyncLocalStorage(v22, v20) orasync_hooks.createHook()(v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.
+Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-59466
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.02% + / + 4.65% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2026-0915
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-0915
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=33802
+- http://www.openwall.com/lists/oss-security/2026/01/16/6
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.02% + / + 3.39% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + + + + + +Upgrade to version: 2.36-9+deb12u11
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-4802
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-4802
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=32976
+- https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
+- http://www.openwall.com/lists/oss-security/2025/05/16/7
+- http://www.openwall.com/lists/oss-security/2025/05/17/2
+- https://lists.debian.org/debian-lts-announce/2025/05/msg00033.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 2.12% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction
+Related Vulnerability Description: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@4.4.19
+ + + + + + + + + + + +Upgrade to version: 7.5.8
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-83g3-92jg-28cx
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 2.12% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction
+Related Vulnerability Description: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@6.2.1
+ + + + + + + + + + + +Upgrade to version: 7.5.8
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-83g3-92jg-28cx
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 2.12% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction
+Related Vulnerability Description: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@7.4.3
+ + + + + + + + + + + +Upgrade to version: 7.5.8
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-83g3-92jg-28cx
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+- https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 1.84% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
+Related Vulnerability Description: node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@4.4.19
+ + + + + + + + + + + +Upgrade to version: 7.5.7
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-34x7-hfp2-rc4v
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+- https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 1.84% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
+Related Vulnerability Description: node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@6.2.1
+ + + + + + + + + + + +Upgrade to version: 7.5.7
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-34x7-hfp2-rc4v
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+- https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 1.84% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
+Related Vulnerability Description: node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@7.4.3
+ + + + + + + + + + + +Upgrade to version: 7.5.7
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-34x7-hfp2-rc4v
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+- https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 1.49% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Multer vulnerable to Denial of Service via unhandled exception from malformed request
+Related Vulnerability Description: Multer is a node.js middleware for handlingmultipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.2 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to version 2.0.2 to receive a patch. No known workarounds are available.
+Matcher: javascript-matcher
+Package URL: pkg:npm/multer@1.4.5-lts.2
+ + + + + + + + + + + +Upgrade to version: 2.0.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-fjgf-rc76-4x9p
+Vulnerability URLs:
+- https://github.com/expressjs/multer/security/advisories/GHSA-fjgf-rc76-4x9p
+- https://nvd.nist.gov/vuln/detail/CVE-2025-7338
+- https://github.com/expressjs/multer/commit/adfeaf669f0e7fe953eab191a762164a452d143b
+- https://cna.openjsf.org/security-advisories.html
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-7338
+Related Vulnerability URLs:
+- https://cna.openjsf.org/security-advisories.html
+- https://github.com/expressjs/multer/commit/adfeaf669f0e7fe953eab191a762164a452d143b
+- https://github.com/expressjs/multer/security/advisories/GHSA-fjgf-rc76-4x9p
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 1.43% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Multer vulnerable to Denial of Service from maliciously crafted requests
+Related Vulnerability Description: Multer is a node.js middleware for handlingmultipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.0 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to version 2.0.0 to receive a patch. No known workarounds are available.
+Matcher: javascript-matcher
+Package URL: pkg:npm/multer@1.4.5-lts.2
+ + + + + + + + + + + +Upgrade to version: 2.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-4pg4-qvpc-4q3h
+Vulnerability URLs:
+- https://github.com/expressjs/multer/security/advisories/GHSA-4pg4-qvpc-4q3h
+- https://nvd.nist.gov/vuln/detail/CVE-2025-47944
+- https://github.com/expressjs/multer/issues/1176
+- https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-47944
+Related Vulnerability URLs:
+- https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+- https://github.com/expressjs/multer/issues/1176
+- https://github.com/expressjs/multer/security/advisories/GHSA-4pg4-qvpc-4q3h
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.91% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jws | + + +0.2.6 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jws/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: auth0/node-jws Improperly Verifies HMAC Signature
+Related Vulnerability Description: auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jws@0.2.6
+ + + + + + + + + + + +Upgrade to version: 3.2.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-869p-cjfg-cm3x
+Vulnerability URLs:
+- https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x
+- https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e
+- https://github.com/auth0/node-jws/commit/4f6e73f24df42f07d632dec6431ade8eda8d11a6
+- https://github.com/auth0/node-jws/releases/tag/v3.2.3
+- https://github.com/auth0/node-jws/releases/tag/v4.0.1
+- https://nvd.nist.gov/vuln/detail/CVE-2025-65945
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-65945
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e
+- https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.31% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS
+Related Vulnerability Description: node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in thepath-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@4.4.19
+ + + + + + + + + + + +Upgrade to version: 7.5.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-r6q2-hw4h-h46w
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.31% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS
+Related Vulnerability Description: node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in thepath-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@6.2.1
+ + + + + + + + + + + +Upgrade to version: 7.5.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-r6q2-hw4h-h46w
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.31% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS
+Related Vulnerability Description: node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in thepath-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@7.4.3
+ + + + + + + + + + + +Upgrade to version: 7.5.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-r6q2-hw4h-h46w
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.34% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
+Related Vulnerability Description: Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc.
+Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2026-0861
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-0861
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=33796
+- https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
+- http://www.openwall.com/lists/oss-security/2026/01/16/5
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.28% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization
+Related Vulnerability Description: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@4.4.19
+ + + + + + + + + + + +Upgrade to version: 7.5.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8qq5-rm4j-mr97
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.28% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization
+Related Vulnerability Description: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@6.2.1
+ + + + + + + + + + + +Upgrade to version: 7.5.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8qq5-rm4j-mr97
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ 0.01% + / + 0.28% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization
+Related Vulnerability Description: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@7.4.3
+ + + + + + + + + + + +Upgrade to version: 7.5.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8qq5-rm4j-mr97
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jws | + + +0.2.6 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jws/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Forgeable Public/Private Tokens in jws
+Matcher: javascript-matcher
+Package URL: pkg:npm/jws@0.2.6
+ + + + + + + + + + + +Upgrade to version: 3.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-gjcw-v447-2w7q
+Vulnerability URLs:
+- https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e
+- https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+- https://www.npmjs.com/advisories/88
+- https://nvd.nist.gov/vuln/detail/CVE-2016-1000223
+- https://snyk.io/vuln/npm:jws:20160726
+Related Vulnerability Datasource: nvd
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 426 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
+ + +glibc: static setuid binary dlopen may incorrectly search LD_LIBRARY_PATH
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 2.36-9+deb12u11Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).
+ + + + + +2.36-9+deb12u11
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2025/05/16/7
+http://www.openwall.com/lists/oss-security/2025/05/17/2
+https://access.redhat.com/errata/RHSA-2025:8655
+https://access.redhat.com/security/cve/CVE-2025-4802
+https://bugzilla.redhat.com/2367468
+https://bugzilla.redhat.com/show_bug.cgi?id=2367468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802
+https://errata.almalinux.org/9/ALSA-2025-8655.html
+https://errata.rockylinux.org/RLSA-2025:8655
+https://linux.oracle.com/cve/CVE-2025-4802.html
+https://linux.oracle.com/errata/ELSA-2025-8686.html
+https://lists.debian.org/debian-lts-announce/2025/05/msg00033.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-4802
+https://sourceware.org/bugzilla/show_bug.cgi?id=32976
+https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e
+https://sourceware.org/cgit/glibc/commit/?id=5451fa962cd0a90a0e2ec1d8910a559ace02bba0
+https://ubuntu.com/security/notices/USN-7541-1
+https://www.cve.org/CVERecord?id=CVE-2025-4802
+https://www.openwall.com/lists/oss-security/2025/05/16/7
+https://www.openwall.com/lists/oss-security/2025/05/17/2
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 190 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + +glibc: Integer overflow in memalign leads to heap corruption
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.
+Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc.
+Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
+ + + + + + + +affected
+ + + + + + + +http://www.openwall.com/lists/oss-security/2026/01/16/5
+https://access.redhat.com/errata/RHSA-2026:2786
+https://access.redhat.com/security/cve/CVE-2026-0861
+https://bugzilla.redhat.com/2429771
+https://bugzilla.redhat.com/2430201
+https://bugzilla.redhat.com/2431196
+https://bugzilla.redhat.com/show_bug.cgi?id=2429771
+https://bugzilla.redhat.com/show_bug.cgi?id=2430201
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
+https://errata.almalinux.org/9/ALSA-2026-2786.html
+https://errata.rockylinux.org/RLSA-2026:1334
+https://linux.oracle.com/cve/CVE-2026-0861.html
+https://linux.oracle.com/errata/ELSA-2026-50120.html
+https://nvd.nist.gov/vuln/detail/CVE-2026-0861
+https://sourceware.org/bugzilla/show_bug.cgi?id=33796
+https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001
+https://ubuntu.com/security/notices/USN-8005-1
+https://www.cve.org/CVERecord?id=CVE-2026-0861
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 787 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
+ + +openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
+
+crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
+non-ASCII BMP code point can trigger a one byte write before the allocated
+buffer.Impact summary: The out-of-bounds write can cause a memory corruption
+
+which can have various consequences including a Denial of Service.The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12
+
+BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,
+the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16
+source byte count as the destination buffer capacity to UTF8_putc(). For BMP
+code points above U+07FF, UTF-8 requires three bytes, but the forwarded
+capacity can be just two bytes. UTF8_putc() then returns -1, and this negative
+value is added to the output length without validation, causing the
+length to become negative. The subsequent trailing NUL byte is then written
+at a negative offset, causing write outside of heap allocated buffer.The vulnerability is reachable via the public PKCS12_get_friendlyname() API
+
+when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a
+different code path that avoids this issue, PKCS12_get_friendlyname() directly
+invokes the vulnerable function. Exploitation requires an attacker to provide
+a malicious PKCS#12 file to be parsed by the application and the attacker
+can just trigger a one zero byte write before the allocated buffer.
+For that reason the issue was assessed as Low severity according to our
+Security Policy.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-69419
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296
+https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb
+https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2
+https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015
+https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535
+https://linux.oracle.com/cve/CVE-2025-69419.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-69419
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2025-69419
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 476 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
+
+dereference in the PKCS12_item_decrypt_d2i_ex() function.Impact summary: A NULL pointer dereference can trigger a crash which leads to
+
+Denial of Service for an application processing PKCS#12 files.The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
+
+parameter is NULL before dereferencing it. When called from
+PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
+be NULL, causing a crash. The vulnerability is limited to Denial of Service
+and cannot be escalated to achieve code execution or memory disclosure.Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
+
+to an application that processes it. For that reason the issue was assessed as
+Low severity according to our Security Policy.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-69421
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b
+https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7
+https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd
+https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3
+https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c
+https://linux.oracle.com/cve/CVE-2025-69421.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-69421
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2025-69421
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| base64url | + + +0.0.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/base64url/package.json | +
+ + +Out-of-bounds Read
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=3.0.0
base64urlallocates uninitialized Buffers when number is passed in input on Node.js 4.x and below
+ + + + + ++=3.0.0
+
+ + + + + + + +fixed
+ + + + + + + +https://github.com/brianloveswords/base64url/pull/25
+https://hackerone.com/reports/321687
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1050 + + | + + +
| Component | + + +Version | + + +
|---|---|
| braces | + + +2.3.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/braces/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +braces: fails to limit the number of characters it can handle
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.0.3The NPM package
braces, versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. Inlib/parse.js,if a malicious user sends "imbalanced braces" as input, the parsing will enter a loop, which will cause the program to start allocating heap memory without freeing it at any moment of the loop. Eventually, the JavaScript heap limit is reached, and the program will crash.
+ + + + + +3.0.3
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-4068
+https://devhub.checkmarx.com/cve-details/CVE-2024-4068
+https://devhub.checkmarx.com/cve-details/CVE-2024-4068/
+https://github.com/micromatch/braces
+https://github.com/micromatch/braces/blob/98414f9f1fabe021736e26836d8306d5de747e0d/lib/parse.js#L308
+https://github.com/micromatch/braces/commit/415d660c3002d1ab7e63dbf490c9851da80596ff
+https://github.com/micromatch/braces/issues/35
+https://github.com/micromatch/braces/pull/37
+https://github.com/micromatch/braces/pull/40
+https://nvd.nist.gov/vuln/detail/CVE-2024-4068
+https://www.cve.org/CVERecord?id=CVE-2024-4068
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 285 + + | + + +
| Component | + + +Version | + + +
|---|---|
| express-jwt | + + +0.1.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N
+ + +Authorization bypass in express-jwt
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 6.0.0In express-jwt (NPM package) up and including version 5.3.3, the algorithms entry to be specified in the configuration is not being enforced. When algorithms is not specified in the configuration, with the combination of jwks-rsa, it may lead to authorization bypass. You are affected by this vulnerability if all of the following conditions apply: - You are using express-jwt - You do not have algorithms configured in your express-jwt configuration. - You are using libraries such as jwks-rsa as the secret. You can fix this by specifying algorithms in the express-jwt configuration. See linked GHSA for example. This is also fixed in version 6.0.0.
+ + + + + +6.0.0
+ + + + + + + +fixed
+ + + + + + + +https://github.com/auth0/express-jwt/commit/7ecab5f8f0cab5297c2b863596566eb0c019cdef
+https://github.com/auth0/express-jwt/security/advisories/GHSA-6g6m-m6h5-w9gf
+https://nvd.nist.gov/vuln/detail/CVE-2020-15084
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 78 + + | + + +
| Component | + + +Version | + + +
|---|---|
| glob | + + +10.4.5 | + + +
| File Path | +
|---|
| juice-shop/node_modules/glob/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
+ + +glob: glob: Command Injection Vulnerability via Malicious Filenames
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 11.1.0, 10.5.0Glob matches files using patterns the shell uses. Starting in version 10.2.0 and prior to versions 10.5.0 and 11.1.0, the glob CLI contains a command injection vulnerability in its -c/--cmd option that allows arbitrary command execution when processing files with malicious names. When glob -c <command> <patterns> are used, matched filenames are passed to a shell with shell: true, enabling shell metacharacters in filenames to trigger command injection and achieve arbitrary code execution under the user or CI account privileges. This issue has been patched in versions 10.5.0 and 11.1.0.
+ + + + + +11.1.0, 10.5.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-64756
+https://github.com/isaacs/node-glob
+https://github.com/isaacs/node-glob/commit/1e4e297342a09f2aa0ced87fcd4a70ddc325d75f
+https://github.com/isaacs/node-glob/commit/47473c046b91c67269df7a66eab782a6c2716146
+https://github.com/isaacs/node-glob/security/advisories/GHSA-5j98-mcp5-4vw2
+https://nvd.nist.gov/vuln/detail/CVE-2025-64756
+https://www.cve.org/CVERecord?id=CVE-2025-64756
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| http-cache-semantics | + + +3.8.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/http-cache-semantics/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.1.1This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.
+ + + + + +4.1.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2023:2655
+https://access.redhat.com/security/cve/CVE-2022-25881
+https://bugzilla.redhat.com/2165824
+https://bugzilla.redhat.com/2168631
+https://bugzilla.redhat.com/2171935
+https://bugzilla.redhat.com/2172190
+https://bugzilla.redhat.com/2172204
+https://bugzilla.redhat.com/2172217
+https://bugzilla.redhat.com/show_bug.cgi?id=2165824
+https://bugzilla.redhat.com/show_bug.cgi?id=2168631
+https://bugzilla.redhat.com/show_bug.cgi?id=2171935
+https://bugzilla.redhat.com/show_bug.cgi?id=2172190
+https://bugzilla.redhat.com/show_bug.cgi?id=2172204
+https://bugzilla.redhat.com/show_bug.cgi?id=2172217
+https://bugzilla.redhat.com/show_bug.cgi?id=2178076
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25881
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4904
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23936
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807
+https://errata.almalinux.org/9/ALSA-2023-2655.html
+https://errata.rockylinux.org/RLSA-2023:2655
+https://github.com/kornelski/http-cache-semantics
+https://github.com/kornelski/http-cache-semantics/blob/master/index.js%23L83
+https://github.com/kornelski/http-cache-semantics/commit/560b2d8ef452bbba20ffed69dc155d63ac757b74
+https://linux.oracle.com/cve/CVE-2022-25881.html
+https://linux.oracle.com/errata/ELSA-2023-2655.html
+https://nvd.nist.gov/vuln/detail/CVE-2022-25881
+https://security.netapp.com/advisory/ntap-20230622-0008
+https://security.netapp.com/advisory/ntap-20230622-0008/
+https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3253332
+https://security.snyk.io/vuln/SNYK-JS-HTTPCACHESEMANTICS-3248783
+https://www.cve.org/CVERecord?id=CVE-2022-25881
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 918 + + | + + +
| Component | + + +Version | + + +
|---|---|
| ip | + + +2.0.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/ip/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + +node-ip: Incomplete fix for CVE-2023-42282
+
+Target: Node.js
+Type: node-pkg
+Fixed version:The ip package through 2.0.1 for Node.js might allow SSRF because some IP addresses (such as 127.1, 01200034567, 012.1.2.3, 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as globally routable via isPublic. NOTE: this issue exists because of an incomplete fix for CVE-2023-42282.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-29415
+https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html
+https://github.com/indutny/node-ip
+https://github.com/indutny/node-ip/issues/150
+https://github.com/indutny/node-ip/pull/143
+https://github.com/indutny/node-ip/pull/144
+https://nvd.nist.gov/vuln/detail/CVE-2024-29415
+https://security.netapp.com/advisory/ntap-20250117-0010
+https://security.netapp.com/advisory/ntap-20250117-0010/
+https://www.cve.org/CVERecord?id=CVE-2024-29415
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 327 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
+ + +jsonwebtoken: Unrestricted key type could lead to legacy keys usagen
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0Versions
<=8.5.1ofjsonwebtokenlibrary could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set theallowInvalidAsymmetricKeyTypesoption totruein thesign()and/orverify()functions.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23539
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23539
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +Verification Bypass
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=4.2.2It is possible for an attacker to bypass verification when "a token digitally signed with an asymetric key (RS/ES family) of algorithms but instead the attacker send a token digitally signed with a symmetric algorithm (HS* family)" [1]
+ + + + + ++=4.2.2
+
+ + + + + + + +fixed
+ + + + + + + +https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+https://github.com/auth0/node-jsonwebtoken/commit/1bb584bc382295eeb7ee8c4452a673a77a68b687
+https://www.timmclean.net/2015/02/25/jwt-alg-none.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 327 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
+ + +jsonwebtoken: Unrestricted key type could lead to legacy keys usagen
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0Versions
<=8.5.1ofjsonwebtokenlibrary could be misconfigured so that legacy, insecure key types are used for signature verification. For example, DSA keys could be used with the RS256 algorithm. You are affected if you are using an algorithm and a key type other than a combination listed in the GitHub Security Advisory as unaffected. This issue has been fixed, please update to version 9.0.0. This version validates for asymmetric key type and algorithm combinations. Please refer to the above mentioned algorithm / key type combinations for the valid secure configuration. After updating to version 9.0.0, if you still intend to continue with signing or verifying tokens using invalid key type/algorithm value combinations, you’ll need to set theallowInvalidAsymmetricKeyTypesoption totruein thesign()and/orverify()functions.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23539
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-8cf7-32gw-wr33
+https://nvd.nist.gov/vuln/detail/CVE-2022-23539
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23539
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 89 + + | + + +
| Line Number | + +
|---|
| 5 | + +
| File Path | +
|---|
| /src/data/static/codefixes/dbSchemaChallenge_1.ts | +
+ + + + + + + + + + + + +Result message: Detected a sequelize statement that is tainted by user-input. This could lead to SQL injection if the variable is user-controlled and is not properly sanitized. In order to prevent SQL injection, it is recommended to use parameterized queries or prepared statements.
+ + + + + + + +https://sequelize.org/docs/v6/core-concepts/raw-queries/#replacements
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jws | + + +0.2.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jws/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
+ + +Forgeable Public/Private Tokens
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=3.0.0Since "algorithm" isn't enforced in
+jws.verify(), a malicious user could choose what algorithm is sent to the server. If the server is expecting RSA but is sent HMAC-SHA with RSA's public key, the server will think the public key is actually an HMAC private key. This could be used to forge any data an attacker wants.In addition, there is the
+nonealgorithm to be concerned about. In versions prior to 3.0.0, verification of the token could be bypassed when thealgfield is set tonone.Edit ( 7/29/16 ): A previous version of this advisory incorrectly stated that the vulnerability was patched in version 2.0.0 instead of 3.0.0. The advisory has been updated to reflect this new information. Thanks to Fabien Catteau for reporting the error.
+ + + + + ++=3.0.0
+
+ + + + + + + +fixed
+ + + + + + + +https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries
+https://auth0.com/blog/2015/03/31/critical-vulnerabilities-in-json-web-token-libraries/
+https://github.com/brianloveswords/node-jws
+https://github.com/brianloveswords/node-jws/commit/585d0e1e97b6747c10cf5b7689ccc5618a89b299#diff-4ac32a78649ca5bdd8e0ba38b7006a1e
+https://nvd.nist.gov/vuln/detail/CVE-2016-1000223
+https://snyk.io/vuln/npm:jws:20160726
+https://www.npmjs.com/advisories/88
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 347 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jws | + + +0.2.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jws/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
+ + +node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.2.3, 4.0.1auth0/node-jws is a JSON Web Signature implementation for Node.js. In versions 3.2.2 and earlier and version 4.0.0, auth0/node-jws has an improper signature verification vulnerability when using the HS256 algorithm under specific conditions. Applications are affected when they use the jws.createVerify() function for HMAC algorithms and use user-provided data from the JSON Web Signature protected header or payload in HMAC secret lookup routines, which can allow attackers to bypass signature verification. This issue has been patched in versions 3.2.3 and 4.0.1.
+ + + + + +3.2.3, 4.0.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-65945
+https://github.com/auth0/node-jws
+https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e
+https://github.com/auth0/node-jws/commit/4f6e73f24df42f07d632dec6431ade8eda8d11a6
+https://github.com/auth0/node-jws/releases/tag/v3.2.3
+https://github.com/auth0/node-jws/releases/tag/v4.0.1
+https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x
+https://nvd.nist.gov/vuln/detail/CVE-2025-65945
+https://www.cve.org/CVERecord?id=CVE-2025-65945
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 400 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
+ + +lodash: Prototype pollution in utilities function
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=4.17.11A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
+ + + + + ++=4.17.11
+
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2018-16487
+https://github.com/advisories/GHSA-4xc9-xhrj-v574
+https://github.com/lodash/lodash/commit/90e6199a161b6445b01454517b40ef65ebecd2ad
+https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-16487.yml
+https://hackerone.com/reports/380873
+https://nvd.nist.gov/vuln/detail/CVE-2018-16487
+https://security.netapp.com/advisory/ntap-20190919-0004
+https://security.netapp.com/advisory/ntap-20190919-0004/
+https://www.cve.org/CVERecord?id=CVE-2018-16487
+https://www.npmjs.com/advisories/782
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 94 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
+ + +nodejs-lodash: command injection via template
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.17.21Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
+ + + + + +4.17.21
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2021-23337
+https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
+https://github.com/advisories/GHSA-35jh-r3h4-6jhm
+https://github.com/lodash/lodash
+https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js
+https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js#L14851
+https://github.com/lodash/lodash/blob/ddfd9b11a0126db2302cb70ec9973b66baec0975/lodash.js%23L14851
+https://github.com/lodash/lodash/commit/3469357cff396a26c363f8c1b5a91dde28ba4b1c
+https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2021-23337.yml
+https://nvd.nist.gov/vuln/detail/CVE-2021-23337
+https://security.netapp.com/advisory/ntap-20210312-0006
+https://security.netapp.com/advisory/ntap-20210312-0006/
+https://snyk.io/vuln/SNYK-JAVA-ORGFUJIONWEBJARS-1074932
+https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1074930
+https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1074928
+https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBLODASH-1074931
+https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1074929
+https://snyk.io/vuln/SNYK-JS-LODASH-1040724
+https://www.cve.org/CVERecord?id=CVE-2021-23337
+https://www.oracle.com//security-alerts/cpujul2021.html
+https://www.oracle.com/security-alerts/cpujan2022.html
+https://www.oracle.com/security-alerts/cpujul2022.html
+https://www.oracle.com/security-alerts/cpuoct2021.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 770 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash.set | + + +4.3.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/lodash.set/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
+ + + + + + +nodejs-lodash: prototype pollution in zipObjectDeep function
+
+Target: Node.js
+Type: node-pkg
+Fixed version:Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2020-8203
+https://github.com/advisories/GHSA-p6mc-m468-83gw
+https://github.com/github/advisory-database/pull/2884
+https://github.com/lodash/lodash
+https://github.com/lodash/lodash/commit/c84fe82760fb2d3e03a63379b297a1cc1a2fce12
+https://github.com/lodash/lodash/issues/4744
+https://github.com/lodash/lodash/issues/4874
+https://github.com/lodash/lodash/wiki/Changelog#v41719
+https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2020-8203.yml
+https://hackerone.com/reports/712065
+https://hackerone.com/reports/864701
+https://nvd.nist.gov/vuln/detail/CVE-2020-8203
+https://security.netapp.com/advisory/ntap-20200724-0006
+https://security.netapp.com/advisory/ntap-20200724-0006/
+https://web.archive.org/web/20210914001339/https://github.com/lodash/lodash/issues/4744
+https://www.cve.org/CVERecord?id=CVE-2020-8203
+https://www.npmjs.com/advisories/1523
+https://www.oracle.com//security-alerts/cpujul2021.html
+https://www.oracle.com/security-alerts/cpuApr2021.html
+https://www.oracle.com/security-alerts/cpuapr2022.html
+https://www.oracle.com/security-alerts/cpujan2022.html
+https://www.oracle.com/security-alerts/cpuoct2021.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.0.5 | + + +
| File Path | +
|---|
| juice-shop/node_modules/replace/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.0.8 | + + +
| File Path | +
|---|
| juice-shop/node_modules/grunt/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/archiver-utils/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/archiver/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/file-js/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/fstream/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/ignore-walk/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/rimraf/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sqlite3/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/ts-node-dev/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +5.1.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/filehound/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| minimatch | + + +9.0.5 | + + +
| File Path | +
|---|
| juice-shop/node_modules/glob/node_modules/minimatch/package.json | +
+ + +minimatch: minimatch: Denial of Service via specially crafted glob patterns
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 10.2.1minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
+ + + + + +10.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26996
+https://github.com/isaacs/minimatch
+https://github.com/isaacs/minimatch/commit/2e111f3a79abc00fa73110195de2c0f2351904f5
+https://github.com/isaacs/minimatch/security/advisories/GHSA-3ppc-4f35-3m26
+https://nvd.nist.gov/vuln/detail/CVE-2026-26996
+https://www.cve.org/CVERecord?id=CVE-2026-26996
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 400 + + | + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +nodejs-moment: Regular expression denial of service
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.19.3The moment module before 2.19.3 for Node.js is prone to a regular expression denial of service via a crafted date string, a different vulnerability than CVE-2016-4055.
+ + + + + +2.19.3
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2017-18214
+https://github.com/advisories/GHSA-446m-mv8f-q348
+https://github.com/moment/moment
+https://github.com/moment/moment/commit/69ed9d44957fa6ab12b73d2ae29d286a857b80eb
+https://github.com/moment/moment/issues/4163
+https://github.com/moment/moment/pull/4326
+https://nodesecurity.io/advisories/532
+https://nvd.nist.gov/vuln/detail/CVE-2017-18214
+https://ubuntu.com/security/notices/USN-4786-1
+https://www.cve.org/CVERecord?id=CVE-2017-18214
+https://www.npmjs.com/advisories/532
+https://www.tenable.com/security/tns-2019-02
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
+ + +Moment.js: Path traversal in moment.locale
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.29.2Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js.
+ + + + + +2.29.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-24785
+https://github.com/moment/moment
+https://github.com/moment/moment/commit/4211bfc8f15746be4019bba557e29a7ba83d54c5
+https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4
+https://lists.debian.org/debian-lts-announce/2023/01/msg00035.html
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q/
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5/
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIO6YNLTK2T7SPKDS4JEL45FANLNC2Q
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORJX2LF6KMPIHP6B2P6KZIVKMLE3LVJ5
+https://nvd.nist.gov/vuln/detail/CVE-2022-24785
+https://security.netapp.com/advisory/ntap-20220513-0006
+https://security.netapp.com/advisory/ntap-20220513-0006/
+https://security.netapp.com/advisory/ntap-20241108-0002
+https://security.netapp.com/advisory/ntap-20241108-0002/
+https://ubuntu.com/security/notices/USN-5559-1
+https://www.cve.org/CVERecord?id=CVE-2022-24785
+https://www.tenable.com/security/tns-2022-09
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 401 + + | + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Multer vulnerable to Denial of Service via memory leaks from unclosed streams
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.0.0Multer is a node.js middleware for handling
multipart/form-data. Versions prior to 2.0.0 are vulnerable to a resource exhaustion and memory leak issue due to improper stream handling. When the HTTP request stream emits an error, the internalbusboystream is not closed, violating Node.js stream safety guidance. This leads to unclosed streams accumulating over time, consuming memory and file descriptors. Under sustained or repeated failure conditions, this can result in denial of service, requiring manual server restarts to recover. All users of Multer handling file uploads are potentially impacted. Users should upgrade to 2.0.0 to receive a patch. No known workarounds are available.
+ + + + + +2.0.0
+ + + + + + + +fixed
+ + + + + + + +https://github.com/expressjs/multer
+https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+https://github.com/expressjs/multer/pull/1120
+https://github.com/expressjs/multer/security/advisories/GHSA-44fp-w29j-9vj5
+https://nvd.nist.gov/vuln/detail/CVE-2025-47935
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 248 + + | + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Multer vulnerable to Denial of Service from maliciously crafted requests
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.0.0Multer is a node.js middleware for handling
multipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.0 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to version 2.0.0 to receive a patch. No known workarounds are available.
+ + + + + +2.0.0
+ + + + + + + +fixed
+ + + + + + + +https://github.com/expressjs/multer
+https://github.com/expressjs/multer/commit/2c8505f207d923dd8de13a9f93a4563e59933665
+https://github.com/expressjs/multer/issues/1176
+https://github.com/expressjs/multer/security/advisories/GHSA-4pg4-qvpc-4q3h
+https://nvd.nist.gov/vuln/detail/CVE-2025-47944
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 248 + + | + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/multer/package.json | +
+ + +multer: Multer vulnerable to Denial of Service via unhandled exception
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.0.1Multer is a node.js middleware for handling
multipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.1 allows an attacker to trigger a Denial of Service (DoS) by sending an upload file request with an empty string field name. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to2.0.1to receive a patch. No known workarounds are available.
+ + + + + +2.0.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-48997
+https://github.com/expressjs/multer
+https://github.com/expressjs/multer/commit/35a3272b611945155e046dd5cef11088587635e9
+https://github.com/expressjs/multer/issues/1233
+https://github.com/expressjs/multer/pull/1256
+https://github.com/expressjs/multer/security/advisories/GHSA-g5hg-p3ph-g8qg
+https://nvd.nist.gov/vuln/detail/CVE-2025-48997
+https://www.cve.org/CVERecord?id=CVE-2025-48997
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 248 + + | + + +
| Component | + + +Version | + + +
|---|---|
| multer | + + +1.4.5-lts.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/multer/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +multer: Multer Denial of Service
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.0.2Multer is a node.js middleware for handling
multipart/form-data. A vulnerability that is present starting in version 1.4.4-lts.1 and prior to version 2.0.2 allows an attacker to trigger a Denial of Service (DoS) by sending a malformed multi-part upload request. This request causes an unhandled exception, leading to a crash of the process. Users should upgrade to version 2.0.2 to receive a patch. No known workarounds are available.
+ + + + + +2.0.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-7338
+https://cna.openjsf.org/security-advisories.html
+https://github.com/expressjs/multer
+https://github.com/expressjs/multer/commit/adfeaf669f0e7fe953eab191a762164a452d143b
+https://github.com/expressjs/multer/security/advisories/GHSA-fjgf-rc76-4x9p
+https://nvd.nist.gov/vuln/detail/CVE-2025-7338
+https://www.cve.org/CVERecord?id=CVE-2025-7338
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| qs | + + +6.13.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/qs/package.json | +
+ + +qs: qs: Denial of Service via improper input validation in array parsing
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 6.14.1Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1.
+Summary
+The arrayLimit option in qs did not enforce limits for bracket notation (a[]=1&a[]=2), only for indexed notation (a[0]=1). This is a consistency bug; arrayLimit should apply uniformly across all array notations.
+Note: The default parameterLimit of 1000 effectively mitigates the DoS scenario originally described. With default options, bracket notation cannot produce arrays larger than parameterLimit regardless of arrayLimit, because each a[]=valueconsumes one parameter slot. The severity has been reduced accordingly.
+Details
+The arrayLimit option only checked limits for indexed notation (a[0]=1&a[1]=2) but did not enforce it for bracket notation (a[]=1&a[]=2).
+Vulnerable code (lib/parse.js:159-162):
+if (root === '[]' && options.parseArrays) {
+
+ obj = utils.combine([], leaf); // No arrayLimit check
+}Working code (lib/parse.js:175):
+else if (index <= options.arrayLimit) { // Limit checked here
+
+ obj = [];
+ obj[index] = leaf;
+}The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays.
+PoC
+const qs = require('qs');
+
+const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 });
+console.log(result.a.length); // Output: 6 (should be max 5)Note on parameterLimit interaction: The original advisory's "DoS demonstration" claimed a length of 10,000, but parameterLimit (default: 1000) caps parsing to 1,000 parameters. With default options, the actual output is 1,000, not 10,000.
+Impact
+Consistency bug in arrayLimit enforcement. With default parameterLimit, the practical DoS risk is negligible since parameterLimit already caps the total number of parsed parameters (and thus array elements from bracket notation). The risk increases only when parameterLimit is explicitly set to a very high value.
+ + + + + +6.14.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-15284
+https://github.com/ljharb/qs
+https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9
+https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p
+https://nvd.nist.gov/vuln/detail/CVE-2025-15284
+https://www.cve.org/CVERecord?id=CVE-2025-15284
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +sanitize-html: insecure global regular expression replacement logic may lead to ReDoS
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.7.1The package sanitize-html before 2.7.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure global regular expression replacement logic of HTML comment removal.
+ + + + + +2.7.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-25887
+https://github.com/apostrophecms/sanitize-html/commit/b4682c12fd30e12e82fa2d9b766de91d7d2cd23c
+https://github.com/apostrophecms/sanitize-html/pull/557
+https://nvd.nist.gov/vuln/detail/CVE-2022-25887
+https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3008102
+https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-2957526
+https://ubuntu.com/security/notices/USN-7464-1
+https://www.cve.org/CVERecord?id=CVE-2022-25887
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.3node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+ + + + + +7.5.3
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23745
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+https://www.cve.org/CVERecord?id=CVE-2026-23745
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 176 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.4node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the
path-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+ + + + + +7.5.4
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23950
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+https://www.cve.org/CVERecord?id=CVE-2026-23950
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.7node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+ + + + + +7.5.7
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-24842
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+https://www.cve.org/CVERecord?id=CVE-2026-24842
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.8node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+ + + + + +7.5.8
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26960
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+https://www.cve.org/CVERecord?id=CVE-2026-26960
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.3node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+ + + + + +7.5.3
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23745
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+https://www.cve.org/CVERecord?id=CVE-2026-23745
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 176 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.4node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the
path-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+ + + + + +7.5.4
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23950
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+https://www.cve.org/CVERecord?id=CVE-2026-23950
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.7node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+ + + + + +7.5.7
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-24842
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+https://www.cve.org/CVERecord?id=CVE-2026-24842
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +6.2.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sqlite3/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.8node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+ + + + + +7.5.8
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26960
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+https://www.cve.org/CVERecord?id=CVE-2026-26960
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/tar/package.json | +
+ + +node-tar: tar: node-tar: Arbitrary file overwrite and symlink poisoning via unsanitized linkpaths in archives
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.3node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
+ + + + + +7.5.3
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23745
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/340eb285b6d986e91969a1170d7fe9b0face405e
+https://github.com/isaacs/node-tar/security/advisories/GHSA-8qq5-rm4j-mr97
+https://nvd.nist.gov/vuln/detail/CVE-2026-23745
+https://www.cve.org/CVERecord?id=CVE-2026-23745
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 176 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L
+ + +node-tar: tar: node-tar: Arbitrary file overwrite via Unicode path collision race condition
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.4node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the
path-reservationssystem. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g.,ßandss), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses aPathReservationssystem to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of usingNFDUnicode normalization (in whichßandssare different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in whichßcauses an inode collision withss)). This enables an attacker to circumvent internal parallelization locks (PathReservations) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updatespath-reservations.jsto use a normalization form that matches the target filesystem's behavior (e.g.,NFKD), followed by firsttoLocaleLowerCase('en')and thentoLocaleUpperCase('en'). As a workaround, users who cannot upgrade promptly, and who are programmatically usingnode-tarto extract arbitrary tarball data should filter out allSymbolicLinkentries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.
+ + + + + +7.5.4
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-23950
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6
+https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w
+https://nvd.nist.gov/vuln/detail/CVE-2026-23950
+https://www.cve.org/CVERecord?id=CVE-2026-23950
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
+ + +node-tar: tar: node-tar: Arbitrary file creation via path traversal bypass in hardlink security check
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.7node-tar,a Tar for Node.js, contains a vulnerability in versions prior to 7.5.7 where the security check for hardlink entries uses different path resolution semantics than the actual hardlink creation logic. This mismatch allows an attacker to craft a malicious TAR archive that bypasses path traversal protections and creates hardlinks to arbitrary files outside the extraction directory. Version 7.5.7 contains a fix for the issue.
+ + + + + +7.5.7
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-24842
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/f4a7aa9bc3d717c987fdf1480ff7a64e87ffdb46
+https://github.com/isaacs/node-tar/security/advisories/GHSA-34x7-hfp2-rc4v
+https://nvd.nist.gov/vuln/detail/CVE-2026-24842
+https://www.cve.org/CVERecord?id=CVE-2026-24842
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +7.4.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
+ + +tar: node-tar: node-tar: Arbitrary file read/write via malicious archive hardlink creation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 7.5.8node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
+ + + + + +7.5.8
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-26960
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384
+https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f
+https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx
+https://nvd.nist.gov/vuln/detail/CVE-2026-26960
+https://www.cve.org/CVERecord?id=CVE-2026-26960
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 22 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar-fs | + + +2.1.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/tar-fs/package.json | +
+ + +tar-fs: tar-fs symlink validation bypass
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.1.1, 2.1.4, 1.16.6tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.1.1, 2.1.3, and 1.16.5 are vulnerable to symlink validation bypass if the destination directory is predictable with a specific tarball. This issue has been patched in version 3.1.1, 2.1.4, and 1.16.6. A workaround involves using the ignore option on non files/directories.
+ + + + + +3.1.1, 2.1.4, 1.16.6
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-59343
+https://github.com/mafintosh/tar-fs
+https://github.com/mafintosh/tar-fs/commit/0bd54cdf06da2b7b5b95cd4b062c9f4e0a8c4e09
+https://github.com/mafintosh/tar-fs/security/advisories/GHSA-vj76-c3g6-qr5v
+https://lists.debian.org/debian-lts-announce/2025/09/msg00028.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-59343
+https://www.cve.org/CVERecord?id=CVE-2025-59343
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 792 + + | + + +
| Component | + + +Version | + + +
|---|---|
| validator | + + +13.15.15 | + + +
| File Path | +
|---|
| juice-shop/node_modules/validator/package.json | +
+ + +Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 13.15.22Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\uFE0F, \uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.
+ + + + + +13.15.22
+ + + + + + + +fixed
+ + + + + + + +http://seclists.org/fulldisclosure/2026/Jan/27
+https://gist.github.com/koral--/ad31208b25b9e3d1e2e35f1d4d72572e
+https://github.com/validatorjs/validator.js
+https://github.com/validatorjs/validator.js/commit/d457ecaf55b0f3d8bd379d82757425d0d13dd382
+https://github.com/validatorjs/validator.js/pull/2616
+https://nvd.nist.gov/vuln/detail/CVE-2025-12758
+https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 476 + + | + + +
| Component | + + +Version | + + +
|---|---|
| ws | + + +7.4.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/engine.io/node_modules/ws/package.json | +
+ + +nodejs-ws: denial of service when handling a request with many HTTP headers
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 5.2.4, 6.2.3, 7.5.10, 8.17.1ws is an open source WebSocket client and server for Node.js. A request with a number of headers exceeding theserver.maxHeadersCount threshold could be used to crash a ws server. The vulnerability was fixed in ws@8.17.1 (e55e510) and backported to ws@7.5.10 (22c2876), ws@6.2.3 (eeb76d3), and ws@5.2.4 (4abd8f6). In vulnerable versions of ws, the issue can be mitigated in the following ways: 1. Reduce the maximum allowed length of the request headers using the --max-http-header-size=size and/or the maxHeaderSize options so that no more headers than the server.maxHeadersCount limit can be sent. 2. Set server.maxHeadersCount to 0 so that no limit is applied.
+ + + + + +5.2.4, 6.2.3, 7.5.10, 8.17.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-37890
+https://github.com/websockets/ws
+https://github.com/websockets/ws/commit/22c28763234aa75a7e1b76f5c01c181260d7917f
+https://github.com/websockets/ws/commit/4abd8f6de4b0b65ef80b3ff081989479ed93377e
+https://github.com/websockets/ws/commit/e55e5106f10fcbaac37cfa89759e4cc0d073a52c
+https://github.com/websockets/ws/commit/eeb76d313e2a00dd5247ca3597bba7877d064a63
+https://github.com/websockets/ws/issues/2230
+https://github.com/websockets/ws/pull/2231
+https://github.com/websockets/ws/security/advisories/GHSA-3h5v-q93c-6h6q
+https://nodejs.org/api/http.html#servermaxheaderscount
+https://nvd.nist.gov/vuln/detail/CVE-2024-37890
+https://www.cve.org/CVERecord?id=CVE-2024-37890
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Line Number | + +
|---|
| 47 | + +
| File Path | +
|---|
| /juice-shop/build/lib/insecurity.js | +
+ + + + + + + + + + + + + + + + + + +Asymmetric Private Key
+Category: AsymmetricPrivateKey
+Match: ----BEGIN RSA PRIVATE KEY-----**********************************************************************************************************************-----END RSA PRIVATE
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + High + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Line Number | + +
|---|
| 23 | + +
| File Path | +
|---|
| /juice-shop/lib/insecurity.ts | +
+ + + + + + + + + + + + + + + + + + +Asymmetric Private Key
+Category: AsymmetricPrivateKey
+Match: ----BEGIN RSA PRIVATE KEY-----**********************************************************************************************************************-----END RSA PRIVATE
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 73 + + | + + +
| Line Number | + +
|---|
| 14 | + +
| File Path | +
|---|
| /src/routes/quarantineServer.ts | +
+ + + + + + + + + + + + +Result message: The application processes user-input, this is passed to res.sendFile which can allow an attacker to arbitrarily read files on the system through path traversal. It is recommended to perform input validation in addition to canonicalizing the path. This allows you to validate the path against the intended directory it should be accessing.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 548 + + | + + +
| Line Number | + +
|---|
| 281 | + +
| File Path | +
|---|
| /src/server.ts | +
+ + + + + + + + + + + + +Result message: Directory listing/indexing is enabled, which may lead to disclosure of sensitive directories and files. It is recommended to disable directory listing unless it is a public resource. If you need directory listing, ensure that sensitive files are inaccessible when querying the resource.
+ + + + + + + +https://www.npmjs.com/package/serve-index
+https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 4.05% + / + 88.28% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Regular Expression Denial of Service in moment
+Related Vulnerability Description: The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
+Matcher: javascript-matcher
+Package URL: pkg:npm/moment@2.0.0
+ + + + + + + + + + + +Upgrade to version: 2.11.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-87vv-r9j6-g5qv
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2016-4055
+- https://www.npmjs.com/advisories/55
+- https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E
+- https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E
+- https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E
+- https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E
+- https://www.tenable.com/security/tns-2019-02
+- http://www.openwall.com/lists/oss-security/2016/04/20/11
+- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
+- http://www.securityfocus.com/bid/95849
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2016-4055
+Related Vulnerability URLs:
+- http://www.openwall.com/lists/oss-security/2016/04/20/11
+- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
+- http://www.securityfocus.com/bid/95849
+- https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E
+- https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E
+- https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E
+- https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E
+- https://nodesecurity.io/advisories/55
+- https://www.tenable.com/security/tns-2019-02
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 548 + + | + + +
| Line Number | + +
|---|
| 277 | + +
| File Path | +
|---|
| /src/server.ts | +
+ + + + + + + + + + + + +Result message: Directory listing/indexing is enabled, which may lead to disclosure of sensitive directories and files. It is recommended to disable directory listing unless it is a public resource. If you need directory listing, ensure that sensitive files are inaccessible when querying the resource.
+ + + + + + + +https://www.npmjs.com/package/serve-index
+https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 2.06% + / + 83.63% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| engine.io | + + +4.1.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/engine.io/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Uncaught exception in engine.io
+Related Vulnerability Description: Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the engine.io package, including those who uses depending packages like socket.io. There is no known workaround except upgrading to a safe version. There are patches for this issue released in versions 3.6.1 and 6.2.1.
+Matcher: javascript-matcher
+Package URL: pkg:npm/engine.io@4.1.2
+ + + + + + + + + + + +Upgrade to version: 6.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-r7qp-cfhv-p84w
+Vulnerability URLs:
+- https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
+- https://nvd.nist.gov/vuln/detail/CVE-2022-41940
+- https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
+- https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-41940
+Related Vulnerability URLs:
+- https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
+- https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
+- https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 548 + + | + + +
| Line Number | + +
|---|
| 273 | + +
| File Path | +
|---|
| /src/server.ts | +
+ + + + + + + + + + + + +Result message: Directory listing/indexing is enabled, which may lead to disclosure of sensitive directories and files. It is recommended to disable directory listing unless it is a public resource. If you need directory listing, ensure that sensitive files are inaccessible when querying the resource.
+ + + + + + + +https://www.npmjs.com/package/serve-index
+https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 1.34% + / + 79.75% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: sanitize-html Information Exposure vulnerability
+Related Vulnerability Description: Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 2.12.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-rm97-x556-q36h
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2024-21501
+- https://github.com/apostrophecms/sanitize-html/pull/650
+- https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
+- https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
+- https://github.com/apostrophecms/apostrophe/discussions/4436
+- https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-21501
+Related Vulnerability URLs:
+- https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
+- https://github.com/apostrophecms/apostrophe/discussions/4436
+- https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
+- https://github.com/apostrophecms/sanitize-html/pull/650
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/
+- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/
+- https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
+- https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 548 + + | + + +
| Line Number | + +
|---|
| 269 | + +
| File Path | +
|---|
| /src/server.ts | +
+ + + + + + + + + + + + +Result message: Directory listing/indexing is enabled, which may lead to disclosure of sensitive directories and files. It is recommended to disable directory listing unless it is a public resource. If you need directory listing, ensure that sensitive files are inaccessible when querying the resource.
+ + + + + + + +https://www.npmjs.com/package/serve-index
+https://www.acunetix.com/blog/articles/directory-listing-information-disclosure/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 601 + + | + + +
| Line Number | + +
|---|
| 19 | + +
| File Path | +
|---|
| /src/routes/redirect.ts | +
+ + + + + + + + + + + + +Result message: It looks like 'toUrl' is read from user input and it is used to as a redirect. Ensure 'toUrl' is not externally controlled, otherwise this is an open redirect.
+ + + + + + + +https://owasp.org/Top10/A01_2021-Broken_Access_Control
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.81% + / + 73.85% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| got | + + +8.3.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/got/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Got allows a redirect to a UNIX socket
+Related Vulnerability Description: The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
+Matcher: javascript-matcher
+Package URL: pkg:npm/got@8.3.2
+ + + + + + + + + + + +Upgrade to version: 11.8.5
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-pfrx-2q88-qq97
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2022-33987
+- https://github.com/sindresorhus/got/pull/2047
+- https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
+- https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
+- https://github.com/sindresorhus/got/releases/tag/v11.8.5
+- https://github.com/sindresorhus/got/releases/tag/v12.1.0
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-33987
+Related Vulnerability URLs:
+- https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
+- https://github.com/sindresorhus/got/pull/2047
+- https://github.com/sindresorhus/got/releases/tag/v11.8.5
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +Cross-Site Scripting in sanitize-html
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 1.11.4Sanitize-html is a library for scrubbing html input of malicious values. Versions 1.11.1 and below are vulnerable to cross site scripting (XSS) in certain scenarios: If allowed at least one nonTextTags, the result is a potential XSS vulnerability.
+ + + + + +1.11.4
+ + + + + + + +fixed
+ + + + + + + +https://github.com/advisories/GHSA-xc6g-ggrc-qq4r
+https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403
+https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))
+https://github.com/punkave/sanitize-html/issues/100
+https://nodesecurity.io/advisories/154
+https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag
+https://nvd.nist.gov/vuln/detail/CVE-2017-16016
+https://www.npmjs.com/advisories/154
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.57% + / + 68.14% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: vm2 vulnerable to Inspect Manipulation
+Related Vulnerability Description: vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the nodeinspectmethod and edit options forconsole.log. As a result a threat actor can edit options for theconsole.logcommand. This vulnerability was patched in the release of version3.9.18ofvm2. Users are advised to upgrade. Users unable to upgrade may make theinspectmethod readonly withvm.readonly(inspect)after creating a vm.
+Matcher: javascript-matcher
+Package URL: pkg:npm/vm2@3.9.17
+ + + + + + + + + + + +Upgrade to version: 3.9.18
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-p5gc-c584-jj6v
+Vulnerability URLs:
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
+- https://nvd.nist.gov/vuln/detail/CVE-2023-32313
+- https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238
+- https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
+- https://github.com/patriksimek/vm2/releases/tag/3.9.18
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-32313
+Related Vulnerability URLs:
+- https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
+- https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238
+- https://github.com/patriksimek/vm2/releases/tag/3.9.18
+- https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +sanitize-html: sanitize-html cross site scripting
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.0.0-beta
sanitize-htmlprior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). ThesanitizeHtml()function inindex.jsdoes not sanitize content when using the customtransformTagsoption, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.
+ + + + + +2.0.0-beta
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2019-25225
+https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225
+https://github.com/apostrophecms/sanitize-html
+https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3
+https://github.com/apostrophecms/sanitize-html/issues/293
+https://github.com/apostrophecms/sanitize-html/pull/156
+https://nvd.nist.gov/vuln/detail/CVE-2019-25225
+https://www.cve.org/CVERecord?id=CVE-2019-25225
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.45% + / + 63.22% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Denial of service while parsing a tar file due to lack of folders count validation
+Related Vulnerability Description: node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
+Matcher: javascript-matcher
+Package URL: pkg:npm/tar@4.4.19
+ + + + + + + + + + + +Upgrade to version: 6.2.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-f5x3-32g6-xq36
+Vulnerability URLs:
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36
+- https://nvd.nist.gov/vuln/detail/CVE-2024-28863
+- https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7
+- https://security.netapp.com/advisory/ntap-20240524-0005
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-28863
+Related Vulnerability URLs:
+- https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7
+- https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36
+- https://security.netapp.com/advisory/ntap-20240524-0005/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 787 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: Writing large, newline-free data into a BIO chain using the
+
+line-buffering filter where the next BIO performs short writes can trigger
+a heap-based out-of-bounds write.Impact summary: This out-of-bounds write can cause memory corruption which
+
+typically results in a crash, leading to Denial of Service for an application.The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
+
+TLS/SSL data paths. In OpenSSL command-line applications, it is typically
+only pushed onto stdout/stderr on VMS systems. Third-party applications that
+explicitly use this filter with a BIO chain that can short-write and that
+write large, newline-free data influenced by an attacker would be affected.
+However, the circumstances where this could happen are unlikely to be under
+attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
+data controlled by an attacker. For that reason the issue was assessed as
+Low severity.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the BIO implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-68160
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad
+https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6
+https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c
+https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0
+https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096
+https://linux.oracle.com/cve/CVE-2025-68160.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-68160
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2025-68160
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.33% + / + 55.30% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Cross-Site Scripting in sanitize-html
+Related Vulnerability Description: sanitize-html before 1.4.3 has XSS.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 1.4.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-3j7m-hmh3-9jmp
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2016-1000237
+- https://github.com/apostrophecms/sanitize-html/issues/29
+- https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf
+- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json
+- https://github.com/punkave/sanitize-html/issues/29
+- https://www.npmjs.com/advisories/135
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2016-1000237
+Related Vulnerability URLs:
+- https://nodesecurity.io/advisories/135
+- https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.30% + / + 53.28% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| notevil | + + +1.3.3 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/notevil/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
+ + + + + + + + + + + + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Sandbox escape in notevil and argencoders-notevil
+Related Vulnerability Description: This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. Note: This vulnerability derives from an incomplete fix in SNYK-JS-NOTEVIL-608878.
+Matcher: javascript-matcher
+Package URL: pkg:npm/notevil@1.3.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-8g4m-cjm2-96wq
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2021-23771
+- https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587
+- https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2021-23771
+Related Vulnerability URLs:
+- https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587
+- https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 325 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
+ + +openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: When using the low-level OCB API directly with AES-NI or
other hardware-accelerated code paths, inputs whose length is not a multiple
of 16 bytes can leave the final partial block unencrypted and unauthenticated.
Impact summary: The trailing 1-15 bytes of a message may be exposed in
cleartext on encryption and are not covered by the authentication tag,
allowing an attacker to read or tamper with those bytes without detection.
The low-level OCB encrypt and decrypt routines in the hardware-accelerated
stream path process full 16-byte blocks but do not advance the input/output
pointers. The subsequent tail-handling code then operates on the original
base pointers, effectively reprocessing the beginning of the buffer while
leaving the actual trailing bytes unprocessed. The authentication checksum
also excludes the true tail bytes.
However, typical OpenSSL consumers using EVP are not affected because the
higher-level EVP and provider OCB implementations split inputs so that full
blocks and trailing partial blocks are processed in separate calls, avoiding
the problematic code path. Additionally, TLS does not use OCB ciphersuites.
The vulnerability only affects applications that call the low-level
CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with
non-block-aligned lengths in a single call on hardware-accelerated builds.
For these reasons the issue was assessed as Low severity.
The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected
by this issue, as OCB mode is not a FIPS-approved algorithm.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
OpenSSL 1.0.2 is not affected by this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-69418
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc
+https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8
+https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347
+https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae
+https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977
+https://linux.oracle.com/cve/CVE-2025-69418.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-69418
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2025-69418
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 754 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +openssl: OpenSSL: Denial of Service via malformed TimeStamp Response
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: A type confusion vulnerability exists in the TimeStamp Response
+
+verification code where an ASN1_TYPE union member is accessed without first
+validating the type, causing an invalid or NULL pointer dereference when
+processing a malformed TimeStamp Response file.Impact summary: An application calling TS_RESP_verify_response() with a
+
+malformed TimeStamp Response can be caused to dereference an invalid or
+NULL pointer when reading, resulting in a Denial of Service.The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()
+
+access the signing cert attribute value without validating its type.
+When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory
+through the ASN1_TYPE union, causing a crash.Exploiting this vulnerability requires an attacker to provide a malformed
+
+TimeStamp Response to an application that verifies timestamp responses. The
+TimeStamp protocol (RFC 3161) is not widely used and the impact of the
+exploit is just a Denial of Service. For these reasons the issue was
+assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the TimeStamp Response implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2025-69420
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9
+https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a
+https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e
+https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b
+https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085
+https://linux.oracle.com/cve/CVE-2025-69420.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-69420
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2025-69420
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.29% + / + 51.91% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Improper Input Validation in sanitize-html
+Related Vulnerability Description: Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\example.com".
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 2.3.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-mjxr-4v3x-q3m4
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2021-26540
+- https://github.com/apostrophecms/sanitize-html/pull/460
+- https://advisory.checkmarx.net/advisory/CX-2021-4309
+- https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2021-26540
+Related Vulnerability URLs:
+- https://advisory.checkmarx.net/advisory/CX-2021-4309
+- https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26
+- https://github.com/apostrophecms/sanitize-html/pull/460
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.29% + / + 51.91% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Improper Input Validation in sanitize-html
+Related Vulnerability Description: Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 2.3.1
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-rjqq-98f6-6j3r
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2021-26539
+- https://github.com/apostrophecms/sanitize-html/pull/458
+- https://advisory.checkmarx.net/advisory/CX-2021-4308
+- https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22
+- https://github.com/apostrophecms/sanitize-html/commit/bdf7836ef8f0e5b21f9a1aab0623ae8fcd09c1da
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2021-26539
+Related Vulnerability URLs:
+- https://advisory.checkmarx.net/advisory/CX-2021-4308
+- https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22
+- https://github.com/apostrophecms/sanitize-html/pull/458
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 125 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
+ + +openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.17-1~deb12u3Issue summary: An application trying to decrypt CMS messages encrypted using
+
+password based encryption can trigger an out-of-bounds read and write.Impact summary: This out-of-bounds read may trigger a crash which leads to
+
+Denial of Service for an application. The out-of-bounds write can cause
+a memory corruption which can have various consequences including
+a Denial of Service or Execution of attacker-supplied code.Although the consequences of a successful exploit of this vulnerability
+
+could be severe, the probability that the attacker would be able to
+perform it is low. Besides, password based (PWRI) encryption support in CMS
+messages is very rarely used. For that reason the issue was assessed as
+Moderate severity according to our Security Policy.The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
+issue, as the CMS implementation is outside the OpenSSL FIPS module
+boundary.
+ + + + + +3.0.17-1~deb12u3
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2025/09/30/5
+https://access.redhat.com/errata/RHSA-2026:2776
+https://access.redhat.com/security/cve/CVE-2025-9230
+https://bugzilla.redhat.com/2396054
+https://bugzilla.redhat.com/show_bug.cgi?id=2396054
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230
+https://errata.almalinux.org/9/ALSA-2026-2776.html
+https://errata.rockylinux.org/RLSA-2025:21255
+https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45
+https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280
+https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def
+https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd
+https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482
+https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3
+https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba
+https://linux.oracle.com/cve/CVE-2025-9230.html
+https://linux.oracle.com/errata/ELSA-2026-50114.html
+https://lists.debian.org/debian-lts-announce/2025/10/msg00001.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-9230
+https://openssl-library.org/news/secadv/20250930.txt
+https://ubuntu.com/security/notices/USN-7786-1
+https://www.cve.org/CVERecord?id=CVE-2025-9230
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.25% + / + 48.27% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Prototype Pollution in lodash
+Related Vulnerability Description: lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash@2.4.2
+ + + + + + + + + + + +Upgrade to version: 4.17.5
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-fvqr-27wr-82fm
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2018-3721
+- https://hackerone.com/reports/310443
+- https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a
+- https://security.netapp.com/advisory/ntap-20190919-0004
+- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-3721.yml
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2018-3721
+Related Vulnerability URLs:
+- https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a
+- https://hackerone.com/reports/310443
+- https://security.netapp.com/advisory/ntap-20190919-0004/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.29% + / + 51.67% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Cross-Site Scripting in sanitize-html
+Related Vulnerability Description: Sanitize-html is a library for scrubbing html input of malicious values. Versions 1.11.1 and below are vulnerable to cross site scripting (XSS) in certain scenarios: If allowed at least one nonTextTags, the result is a potential XSS vulnerability.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 1.11.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-xc6g-ggrc-qq4r
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2017-16016
+- https://github.com/punkave/sanitize-html/issues/100
+- https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403)))
+- https://npmjs.com/package/sanitize-html#discarding-the-entire-contents-of-a-disallowed-tag
+- https://www.npmjs.com/advisories/154
+- https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2017-16016
+Related Vulnerability URLs:
+- https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403
+- https://github.com/punkave/sanitize-html/issues/100
+- https://nodesecurity.io/advisories/154
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.20% + / + 42.31% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| socket.io-parser | + + +4.0.5 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/socket.io-parser/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Insufficient validation when decoding a Socket.IO packet
+Related Vulnerability Description: socket.io parser is a socket.io encoder and decoder written in JavaScript complying with version 5 of socket.io-protocol. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. A patch has been released in version 4.2.3.
+Matcher: javascript-matcher
+Package URL: pkg:npm/socket.io-parser@4.0.5
+ + + + + + + + + + + +Upgrade to version: 4.2.3
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-cqmj-92xf-r6r9
+Vulnerability URLs:
+- https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9
+- https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced
+- https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3
+- https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9
+- https://nvd.nist.gov/vuln/detail/CVE-2023-32695
+- https://github.com/socketio/socket.io-parser/releases/tag/4.2.3
+- https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2023-32695
+Related Vulnerability URLs:
+- https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced
+- https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3
+- https://github.com/socketio/socket.io-parser/releases/tag/4.2.3
+- https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.14% + / + 33.45% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| socket.io | + + +3.1.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/socket.io/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: socket.io has an unhandled 'error' event
+Related Vulnerability Description: Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit15af22fc22which has been included insocket.io@4.6.2(released in May 2023). The fix was backported in the 2.x branch as well with commitd30630ba10. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
+Matcher: javascript-matcher
+Package URL: pkg:npm/socket.io@3.1.2
+ + + + + + + + + + + +Upgrade to version: 4.6.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-25hc-qcg6-38wj
+Vulnerability URLs:
+- https://github.com/socketio/socket.io/security/advisories/GHSA-25hc-qcg6-38wj
+- https://github.com/socketio/socket.io/commit/15af22fc22bc6030fcead322c106f07640336115
+- https://github.com/socketio/socket.io/commit/d30630ba10562bf987f4d2b42440fc41a828119c
+- https://nvd.nist.gov/vuln/detail/CVE-2024-38355
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-38355
+Related Vulnerability URLs:
+- https://github.com/socketio/socket.io/commit/15af22fc22bc6030fcead322c106f07640336115
+- https://github.com/socketio/socket.io/commit/d30630ba10562bf987f4d2b42440fc41a828119c
+- https://github.com/socketio/socket.io/security/advisories/GHSA-25hc-qcg6-38wj
+- https://www.vicarius.io/vsociety/posts/unhandled-exception-in-socketio-cve-2024-38355
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 754 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + +openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: An invalid or NULL pointer dereference can happen in
+
+an application processing a malformed PKCS#12 file.Impact summary: An application processing a malformed PKCS#12 file can be
+
+caused to dereference an invalid or NULL pointer on memory read, resulting
+in a Denial of Service.A type confusion vulnerability exists in PKCS#12 parsing code where
+
+an ASN1_TYPE union member is accessed without first validating the type,
+causing an invalid pointer read.The location is constrained to a 1-byte address space, meaning any
+
+attempted pointer manipulation can only target addresses between 0x00 and 0xFF.
+This range corresponds to the zero page, which is unmapped on most modern
+operating systems and will reliably result in a crash, leading only to a
+Denial of Service. Exploiting this issue also requires a user or application
+to process a maliciously crafted PKCS#12 file. It is uncommon to accept
+untrusted PKCS#12 files in applications as they are usually used to store
+private keys which are trusted by definition. For these reasons, the issue
+was assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2026-22795
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
+https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
+https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
+https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
+https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
+https://linux.oracle.com/cve/CVE-2026-22795.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2026-22795
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2026-22795
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 754 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.18-1~deb12u2Issue summary: A type confusion vulnerability exists in the signature
+
+verification of signed PKCS#7 data where an ASN1_TYPE union member is
+accessed without first validating the type, causing an invalid or NULL
+pointer dereference when processing malformed PKCS#7 data.Impact summary: An application performing signature verification of PKCS#7
+
+data or calling directly the PKCS7_digest_from_attributes() function can be
+caused to dereference an invalid or NULL pointer when reading, resulting in
+a Denial of Service.The function PKCS7_digest_from_attributes() accesses the message digest attribute
+
+value without validating its type. When the type is not V_ASN1_OCTET_STRING,
+this results in accessing invalid memory through the ASN1_TYPE union, causing
+a crash.Exploiting this vulnerability requires an attacker to provide a malformed
+
+signed PKCS#7 to an application that verifies it. The impact of the
+exploit is just a Denial of Service, the PKCS7 API is legacy and applications
+should be using the CMS API instead. For these reasons the issue was
+assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+ + + + + +3.0.18-1~deb12u2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:1473
+https://access.redhat.com/security/cve/CVE-2026-22796
+https://bugzilla.redhat.com/2430375
+https://bugzilla.redhat.com/2430376
+https://bugzilla.redhat.com/2430377
+https://bugzilla.redhat.com/2430378
+https://bugzilla.redhat.com/2430379
+https://bugzilla.redhat.com/2430380
+https://bugzilla.redhat.com/2430381
+https://bugzilla.redhat.com/2430386
+https://bugzilla.redhat.com/2430387
+https://bugzilla.redhat.com/2430388
+https://bugzilla.redhat.com/2430389
+https://bugzilla.redhat.com/2430390
+https://bugzilla.redhat.com/show_bug.cgi?id=2430375
+https://bugzilla.redhat.com/show_bug.cgi?id=2430376
+https://bugzilla.redhat.com/show_bug.cgi?id=2430377
+https://bugzilla.redhat.com/show_bug.cgi?id=2430378
+https://bugzilla.redhat.com/show_bug.cgi?id=2430379
+https://bugzilla.redhat.com/show_bug.cgi?id=2430380
+https://bugzilla.redhat.com/show_bug.cgi?id=2430381
+https://bugzilla.redhat.com/show_bug.cgi?id=2430386
+https://bugzilla.redhat.com/show_bug.cgi?id=2430387
+https://bugzilla.redhat.com/show_bug.cgi?id=2430388
+https://bugzilla.redhat.com/show_bug.cgi?id=2430389
+https://bugzilla.redhat.com/show_bug.cgi?id=2430390
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796
+https://errata.almalinux.org/9/ALSA-2026-1473.html
+https://errata.rockylinux.org/RLSA-2026:1473
+https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
+https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
+https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
+https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
+https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
+https://linux.oracle.com/cve/CVE-2026-22796.html
+https://linux.oracle.com/errata/ELSA-2026-50081.html
+https://nvd.nist.gov/vuln/detail/CVE-2026-22796
+https://openssl-library.org/news/secadv/20260127.txt
+https://ubuntu.com/security/notices/USN-7980-1
+https://ubuntu.com/security/notices/USN-7980-2
+https://www.cve.org/CVERecord?id=CVE-2026-22796
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.13% + / + 32.02% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| micromatch | + + +3.1.10 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/micromatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Regular Expression Denial of Service (ReDoS) in micromatch
+Related Vulnerability Description: The NPM packagemicromatchprior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs inmicromatch.braces()inindex.jsbecause the pattern.*will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.
+Matcher: javascript-matcher
+Package URL: pkg:npm/micromatch@3.1.10
+ + + + + + + + + + + +Upgrade to version: 4.0.8
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-952p-6rrq-rcjv
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2024-4067
+- https://github.com/micromatch/micromatch/issues/243
+- https://github.com/micromatch/micromatch/pull/247
+- https://devhub.checkmarx.com/cve-details/CVE-2024-4067
+- https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
+- https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0
+- https://github.com/micromatch/micromatch/pull/266
+- https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
+- https://advisory.checkmarx.net/advisory/CVE-2024-4067
+- https://github.com/micromatch/micromatch/releases/tag/4.0.8
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-4067
+Related Vulnerability URLs:
+- https://advisory.checkmarx.net/advisory/CVE-2024-4067/
+- https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
+- https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
+- https://github.com/micromatch/micromatch/pull/266
+- https://github.com/micromatch/micromatch/releases/tag/4.0.8
+- https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
+- https://github.com/micromatch/micromatch/issues/243
+- https://github.com/micromatch/micromatch/pull/247
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +sanitize-html: improper handling of internationalized domain name (IDN) can lead to bypass hostname whitelist validation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.3.1Apostrophe Technologies sanitize-html before 2.3.1 does not properly handle internationalized domain name (IDN) which could allow an attacker to bypass hostname whitelist validation set by the "allowedIframeHostnames" option.
+ + + + + +2.3.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2021-26539
+https://advisory.checkmarx.net/advisory/CX-2021-4308
+https://github.com/apostrophecms/sanitize-html
+https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#231-2021-01-22
+https://github.com/apostrophecms/sanitize-html/commit/bdf7836ef8f0e5b21f9a1aab0623ae8fcd09c1da
+https://github.com/apostrophecms/sanitize-html/pull/458
+https://nvd.nist.gov/vuln/detail/CVE-2021-26539
+https://www.cve.org/CVERecord?id=CVE-2021-26539
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| base64url | + + +0.0.6 | + + +
| File Path | +
|---|
| juice-shop/node_modules/base64url/package.json | +
+ + +Out-of-bounds Read in base64url
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.0.0Versions of
+base64urlbefore 3.0.0 are vulnerable to to out-of-bounds reads as it allocates uninitialized Buffers when number is passed in input on Node.js 4.x and below.Recommendation
+Update to version 3.0.0 or later.
+ + + + + +3.0.0
+ + + + + + + +fixed
+ + + + + + + +https://github.com/brianloveswords/base64url
+https://github.com/brianloveswords/base64url/commit/4fbd954a0a69e9d898de2146557cc6e893e79542
+https://github.com/brianloveswords/base64url/pull/25
+https://hackerone.com/reports/321687
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +sanitize-html: improper validation of hostnames set by the "allowedIframeHostnames" option can lead to bypass hostname whitelist for iframe element
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.3.2Apostrophe Technologies sanitize-html before 2.3.2 does not properly validate the hostnames set by the "allowedIframeHostnames" option when the "allowIframeRelativeUrls" is set to true, which allows attackers to bypass hostname whitelist for iframe element, related using an src value that starts with "/\example.com".
+ + + + + +2.3.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2021-26540
+https://advisory.checkmarx.net/advisory/CX-2021-4309
+https://github.com/apostrophecms/sanitize-html/blob/main/CHANGELOG.md#232-2021-01-26
+https://github.com/apostrophecms/sanitize-html/pull/460
+https://nvd.nist.gov/vuln/detail/CVE-2021-26540
+https://www.cve.org/CVERecord?id=CVE-2021-26540
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.07% + / + 21.79% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| validator | + + +13.15.15 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/validator/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: validator.js has a URL validation bypass vulnerability in its isURL function
+Related Vulnerability Description: A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
+Matcher: javascript-matcher
+Package URL: pkg:npm/validator@13.15.15
+ + + + + + + + + + + +Upgrade to version: 13.15.20
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-9965-vmph-33xx
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2025-56200
+- https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666
+- https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596
+- https://github.com/validatorjs/validator.js
+- http://validatorjs.com
+- https://github.com/validatorjs/validator.js/issues/2600
+- https://github.com/validatorjs/validator.js/pull/2608
+- https://github.com/validatorjs/validator.js/commit/cbef5088f02d36caf978f378bb845fe49bdc0809
+- https://github.com/validatorjs/validator.js/releases/tag/13.15.20
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-56200
+Related Vulnerability URLs:
+- http://validatorjs.com
+- https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666
+- https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596
+- https://github.com/validatorjs/validator.js
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Line Number | + +
|---|
| 61 | + +
| File Path | +
|---|
| /juice-shop/frontend/src/app/last-login-ip/last-login-ip.component.spec.ts | +
+ + + + + + + + + + + + + + + + + + +JWT token
+Category: JWT
+Match: ocalStorage.setItem('token', '*******************')
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.07% + / + 21.55% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Related Vulnerability Description: Issue summary: A type confusion vulnerability exists in the signature
+verification of signed PKCS#7 data where an ASN1_TYPE union member is
+accessed without first validating the type, causing an invalid or NULL
+pointer dereference when processing malformed PKCS#7 data.Impact summary: An application performing signature verification of PKCS#7
+
+data or calling directly the PKCS7_digest_from_attributes() function can be
+caused to dereference an invalid or NULL pointer when reading, resulting in
+a Denial of Service.The function PKCS7_digest_from_attributes() accesses the message digest attribute
+
+value without validating its type. When the type is not V_ASN1_OCTET_STRING,
+this results in accessing invalid memory through the ASN1_TYPE union, causing
+a crash.Exploiting this vulnerability requires an attacker to provide a malformed
+
+signed PKCS#7 to an application that verifies it. The impact of the
+exploit is just a Denial of Service, the PKCS7 API is legacy and applications
+should be using the CMS API instead. For these reasons the issue was
+assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module
+boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2026-22796
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-22796
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
+- https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
+- https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
+- https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
+- https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 248 + + | + + +
| Component | + + +Version | + + +
|---|---|
| engine.io | + + +4.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/engine.io/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +engine.io: Specially crafted HTTP request can trigger an uncaught exception
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.6.1, 6.2.1Engine.IO is the implementation of transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. This impacts all the users of the engine.io package, including those who uses depending packages like socket.io. There is no known workaround except upgrading to a safe version. There are patches for this issue released in versions 3.6.1 and 6.2.1.
+ + + + + +3.6.1, 6.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-41940
+https://github.com/socketio/engine.io
+https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6
+https://github.com/socketio/engine.io/commit/83c4071af871fc188298d7d591e95670bf9f9085
+https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w
+https://nvd.nist.gov/vuln/detail/CVE-2022-41940
+https://www.cve.org/CVERecord?id=CVE-2022-41940
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + +sanitize-html: Information Exposure when used on the backend
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.12.1Versions of the package sanitize-html before 2.12.1 are vulnerable to Information Exposure when used on the backend and with the style attribute allowed, allowing enumeration of files in the system (including project dependencies). An attacker could exploit this vulnerability to gather details about the file system structure and dependencies of the targeted server.
+ + + + + +2.12.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-21501
+https://gist.github.com/Slonser/8b4d061abe6ee1b2e10c7242987674cf
+https://github.com/apostrophecms/apostrophe/discussions/4436
+https://github.com/apostrophecms/sanitize-html
+https://github.com/apostrophecms/sanitize-html/commit/c5dbdf77fe8b836d3bf4554ea39edb45281ec0b4
+https://github.com/apostrophecms/sanitize-html/pull/650
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EB5JPYRCTS64EA5AMV3INHDPI6I4AW7/
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S
+https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P4I5X6V3LYUNBMZ5YOW4BV427TH3IK4S/
+https://nvd.nist.gov/vuln/detail/CVE-2024-21501
+https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-6276557
+https://security.snyk.io/vuln/SNYK-JS-SANITIZEHTML-6256334
+https://www.cve.org/CVERecord?id=CVE-2024-21501
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +Cross Site Scripting
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=1.11.4Sanitize-html is a library for scrubbing html input of malicious values.
+Versions 1.11.1 and below are vulnerable to cross site scripting (XSS) in certain scenarios:
+If allowed at least one nonTextTags, the result is a potential XSS vulnerability.
+
+PoC:var sanitizeHtml = require('sanitize-html'); + +var dirty = '!<textarea></textarea><svg/onload=prompt`xs`></textarea>!'; +var clean = sanitizeHtml(dirty, { + allowedTags: [ 'textarea' ] +}); + +console.log(clean); + +// !<textarea></textarea><svg/onload=prompt`xs`></textarea>! +
+ + + + + ++=1.11.4
+
+ + + + + + + +fixed
+ + + + + + + +https://github.com/punkave/sanitize-html/commit/5d205a1005ba0df80e21d8c64a15bb3accdb2403
+https://github.com/punkave/sanitize-html/issues/100
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| got | + + +8.3.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/got/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +nodejs-got: missing verification of requested URLs allows redirects to UNIX sockets
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 12.1.0, 11.8.5The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket.
+ + + + + +12.1.0, 11.8.5
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2022:6595
+https://access.redhat.com/security/cve/CVE-2022-33987
+https://bugzilla.redhat.com/1907444
+https://bugzilla.redhat.com/1945459
+https://bugzilla.redhat.com/1964461
+https://bugzilla.redhat.com/2007557
+https://bugzilla.redhat.com/2098556
+https://bugzilla.redhat.com/2102001
+https://bugzilla.redhat.com/2105422
+https://bugzilla.redhat.com/2105426
+https://bugzilla.redhat.com/2105428
+https://bugzilla.redhat.com/2105430
+https://bugzilla.redhat.com/show_bug.cgi?id=1907444
+https://bugzilla.redhat.com/show_bug.cgi?id=1945459
+https://bugzilla.redhat.com/show_bug.cgi?id=1964461
+https://bugzilla.redhat.com/show_bug.cgi?id=2007557
+https://bugzilla.redhat.com/show_bug.cgi?id=2098556
+https://bugzilla.redhat.com/show_bug.cgi?id=2102001
+https://bugzilla.redhat.com/show_bug.cgi?id=2105422
+https://bugzilla.redhat.com/show_bug.cgi?id=2105426
+https://bugzilla.redhat.com/show_bug.cgi?id=2105428
+https://bugzilla.redhat.com/show_bug.cgi?id=2105430
+https://bugzilla.redhat.com/show_bug.cgi?id=2121019
+https://bugzilla.redhat.com/show_bug.cgi?id=2124299
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3807
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29244
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32213
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32214
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32215
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987
+https://errata.almalinux.org/9/ALSA-2022-6595.html
+https://errata.rockylinux.org/RLSA-2022:6595
+https://github.com/sindresorhus/got
+https://github.com/sindresorhus/got/commit/861ccd9ac2237df762a9e2beed7edd88c60782dc
+https://github.com/sindresorhus/got/compare/v12.0.3...v12.1.0
+https://github.com/sindresorhus/got/pull/2047
+https://github.com/sindresorhus/got/releases/tag/v11.8.5
+https://github.com/sindresorhus/got/releases/tag/v12.1.0
+https://linux.oracle.com/cve/CVE-2022-33987.html
+https://linux.oracle.com/errata/ELSA-2022-6595.html
+https://nvd.nist.gov/vuln/detail/CVE-2022-33987
+https://www.cve.org/CVERecord?id=CVE-2022-33987
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| socket.io | + + +3.1.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/socket.io/package.json | +
+ + +socket.io: Unhandled 'error' event
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 2.5.1, 4.6.2Socket.IO is an open source, real-time, bidirectional, event-based, communication framework. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. This issue is fixed by commit
15af22fc22which has been included insocket.io@4.6.2(released in May 2023). The fix was backported in the 2.x branch as well with commitd30630ba10. Users are advised to upgrade. Users unable to upgrade may attach a listener for the "error" event to catch these errors.
+ + + + + +2.5.1, 4.6.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-38355
+https://github.com/socketio/socket.io
+https://github.com/socketio/socket.io/commit/15af22fc22bc6030fcead322c106f07640336115
+https://github.com/socketio/socket.io/commit/d30630ba10562bf987f4d2b42440fc41a828119c
+https://github.com/socketio/socket.io/security/advisories/GHSA-25hc-qcg6-38wj
+https://nvd.nist.gov/vuln/detail/CVE-2024-38355
+https://www.cve.org/CVERecord?id=CVE-2024-38355
+https://www.vicarius.io/vsociety/posts/unhandled-exception-in-socketio-cve-2024-38355
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.06% + / + 18.84% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
+Related Vulnerability Description: jsonwebtoken is an implementation of JSON Web Tokens. Versions<= 8.5.1ofjsonwebtokenlibrary can be misconfigured so that passing a poorly implemented key retrieval function referring to thesecretOrPublicKeyargument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.1.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-hjrf-2m68-5959
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+- https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.06% + / + 18.84% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
+Related Vulnerability Description: jsonwebtoken is an implementation of JSON Web Tokens. Versions<= 8.5.1ofjsonwebtokenlibrary can be misconfigured so that passing a poorly implemented key retrieval function referring to thesecretOrPublicKeyargument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.4.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-hjrf-2m68-5959
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+- https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| socket.io-parser | + + +4.0.5 | + + +
| File Path | +
|---|
| juice-shop/node_modules/socket.io-parser/package.json | +
+ + +socket.io parser is a socket.io encoder and decoder written in JavaScr ...
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.2.3, 3.4.3, 3.3.4socket.io parser is a socket.io encoder and decoder written in JavaScript complying with version 5 of socket.io-protocol. A specially crafted Socket.IO packet can trigger an uncaught exception on the Socket.IO server, thus killing the Node.js process. A patch has been released in version 4.2.3.
+ + + + + +4.2.3, 3.4.3, 3.3.4
+ + + + + + + +fixed
+ + + + + + + +https://github.com/socketio/socket.io-parser
+https://github.com/socketio/socket.io-parser/commit/1c220ddbf45ea4b44bc8dbf6f9ae245f672ba1b9
+https://github.com/socketio/socket.io-parser/commit/2dc3c92622dad113b8676be06f23b1ed46b02ced
+https://github.com/socketio/socket.io-parser/commit/3b78117bf6ba7e99d7a5cfc1ba54d0477554a7f3
+https://github.com/socketio/socket.io-parser/commit/ee006607495eca4ec7262ad080dd3a91439a5ba4
+https://github.com/socketio/socket.io-parser/releases/tag/4.2.3
+https://github.com/socketio/socket.io-parser/security/advisories/GHSA-cqmj-92xf-r6r9
+https://nvd.nist.gov/vuln/detail/CVE-2023-32695
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 71 | + +
| File Path | +
|---|
| /src/routes/videoHandler.ts | +
+ + + + + + + + + + + + +Result message: Cannot determine what 'subs' is and it is used with a '<script>' tag. This could be susceptible to cross-site scripting (XSS). Ensure 'subs' is not externally controlled, or sanitize this data.
+ + + + + + + +https://www.developsec.com/2017/11/09/xss-in-a-script-tag/
+https://github.com/juice-shop/juice-shop/blob/1ceb8751e986dacd3214a618c37e7411be6bc11a/routes/videoHandler.ts#L68
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1321 + + | + + +
| Component | + + +Version | + + +
|---|---|
| js-yaml | + + +3.14.1 | + + +
| File Path | +
|---|
| juice-shop/node_modules/js-yaml/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +js-yaml: js-yaml prototype pollution in merge
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.1.1, 3.14.2js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (
__proto__). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by usingnode --disable-proto=deleteordeno(in Deno, pollution protection is on by default).
+ + + + + +4.1.1, 3.14.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2025-64718
+https://github.com/advisories/GHSA-mh29-5h37-fv8m
+https://github.com/nodeca/js-yaml
+https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879
+https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266
+https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876
+https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m
+https://nvd.nist.gov/vuln/detail/CVE-2025-64718
+https://www.cve.org/CVERecord?id=CVE-2025-64718
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 73 + + | + + +
| Line Number | + +
|---|
| 14 | + +
| File Path | +
|---|
| /src/routes/logfileServer.ts | +
+ + + + + + + + + + + + +Result message: The application processes user-input, this is passed to res.sendFile which can allow an attacker to arbitrarily read files on the system through path traversal. It is recommended to perform input validation in addition to canonicalizing the path. This allows you to validate the path against the intended directory it should be accessing.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.04% + / + 12.12% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: sanitize-html is vulnerable to XSS through incomprehensive sanitization
+Related Vulnerability Description:sanitize-htmlprior to version 2.0.0-beta is vulnerable to Cross-site Scripting (XSS). ThesanitizeHtml()function inindex.jsdoes not sanitize content when using the customtransformTagsoption, which is intended to convert attribute values into text. As a result, malicious input can be transformed into executable code.
+Matcher: javascript-matcher
+Package URL: pkg:npm/sanitize-html@1.4.2
+ + + + + + + + + + + +Upgrade to version: 2.0.0-beta
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-qhxp-v273-g94h
+Vulnerability URLs:
+- https://nvd.nist.gov/vuln/detail/CVE-2019-25225
+- https://github.com/apostrophecms/sanitize-html/issues/293
+- https://github.com/apostrophecms/sanitize-html/pull/156
+- https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3
+- https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-25225
+Related Vulnerability URLs:
+- https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2019/CVE-2019-25225
+- https://github.com/apostrophecms/sanitize-html/commit/712cb6895825c8bb6ede71a16b42bade42abcaf3
+- https://github.com/apostrophecms/sanitize-html/issues/293
+- https://github.com/apostrophecms/sanitize-html/pull/156
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 40 | + +
| File Path | +
|---|
| /src/frontend/src/app/search-result/search-result.component.html | +
+ + + + + + + + + + + + +Result message: Detected a unquoted template variable as an attribute. If unquoted, a malicious actor could inject custom JavaScript handlers. To fix this, add quotes around the template expression, like this: "{{ expr }}".
+ + + + + + + +https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.04% + / + 11.77% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: An application using the OpenSSL HTTP client API functions may trigger an out-of-bounds read if the 'no_proxy' environment variable is set and the host portion of the authority component of the HTTP URL is an IPv6 address. Impact summary: An out-of-bounds read can trigger a crash which leads to Denial of Service for an application. The OpenSSL HTTP client API functions can be used directly by applications but they are also used by the OCSP client functions and CMP (Certificate Management Protocol) client implementation in OpenSSL. However the URLs used by these implementations are unlikely to be controlled by an attacker. In this vulnerable code the out of bounds read can only trigger a crash. Furthermore the vulnerability requires an attacker-controlled URL to be passed from an application to the OpenSSL function and the user has to have a 'no_proxy' environment variable set. For the aforementioned reasons the issue was assessed as Low severity. The vulnerable code was introduced in the following patch releases: 3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0. The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this issue, as the HTTP client implementation is outside the OpenSSL FIPS module boundary.
+Related Vulnerability Description: Issue summary: An application using the OpenSSL HTTP client API functions may
+trigger an out-of-bounds read if the 'no_proxy' environment variable is set and
+the host portion of the authority component of the HTTP URL is an IPv6 address.Impact summary: An out-of-bounds read can trigger a crash which leads to
+
+Denial of Service for an application.The OpenSSL HTTP client API functions can be used directly by applications
+
+but they are also used by the OCSP client functions and CMP (Certificate
+Management Protocol) client implementation in OpenSSL. However the URLs used
+by these implementations are unlikely to be controlled by an attacker.In this vulnerable code the out of bounds read can only trigger a crash.
+
+Furthermore the vulnerability requires an attacker-controlled URL to be
+passed from an application to the OpenSSL function and the user has to have
+a 'no_proxy' environment variable set. For the aforementioned reasons the
+issue was assessed as Low severity.The vulnerable code was introduced in the following patch releases:
+
+3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
+issue, as the HTTP client implementation is outside the OpenSSL FIPS module
+boundary.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.17-1~deb12u3
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-9232
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-9232
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35
+- https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b
+- https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3
+- https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf
+- https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0
+- https://openssl-library.org/news/secadv/20250930.txt
+- http://www.openwall.com/lists/oss-security/2025/09/30/5
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 15 | + +
| File Path | +
|---|
| /src/frontend/src/app/purchase-basket/purchase-basket.component.html | +
+ + + + + + + + + + + + +Result message: Detected a unquoted template variable as an attribute. If unquoted, a malicious actor could inject custom JavaScript handlers. To fix this, add quotes around the template expression, like this: "{{ expr }}".
+ + + + + + + +https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 287 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
+ + +jsonwebtoken: Insecure default algorithm in jwt.verify() could lead to signature validation bypass
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0In versions
<=8.5.1ofjsonwebtokenlibrary, lack of algorithm definition in thejwt.verify()function can lead to signature validation bypass due to defaulting to thenonealgorithm for signature verification. Users are affected if you do not specify algorithms in thejwt.verify()function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in thejwt.verify()method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for thenonealgorithm. If you need 'none' algorithm, you have to explicitly specify that injwt.verify()options.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23540
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23540
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.03% + / + 6.82% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +4.17.21 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
+ + +Vulnerability Namespace: github:language:javascript
+
+Vulnerability Description: Lodash has Prototype Pollution Vulnerability in_.unsetand_.omitfunctions
+Related Vulnerability Description: Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the .unset and .omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.The issue permits deletion of properties but does not allow overwriting their original behavior.
+This issue is patched on 4.17.23
+Matcher: javascript-matcher
+Package URL: pkg:npm/lodash@4.17.21
+ + + + + + + + + + + +Upgrade to version: 4.17.23
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-xxjr-mmjv-4gpg
+Vulnerability URLs:
+- https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg
+- https://nvd.nist.gov/vuln/detail/CVE-2025-13465
+- https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-13465
+Related Vulnerability URL: https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 287 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
+ + +jsonwebtoken: Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0jsonwebtoken is an implementation of JSON Web Tokens. Versions
<= 8.5.1ofjsonwebtokenlibrary can be misconfigured so that passing a poorly implemented key retrieval function referring to thesecretOrPublicKeyargument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23541
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23541
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 73 + + | + + +
| Line Number | + +
|---|
| 14 | + +
| File Path | +
|---|
| /src/routes/keyServer.ts | +
+ + + + + + + + + + + + +Result message: The application processes user-input, this is passed to res.sendFile which can allow an attacker to arbitrarily read files on the system through path traversal. It is recommended to perform input validation in addition to canonicalizing the path. This allows you to validate the path against the intended directory it should be accessing.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.02% + / + 4.96% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| js-yaml | + + +3.14.1 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/js-yaml/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: js-yaml has prototype pollution in merge (<<)
+Related Vulnerability Description: js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (__proto__). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by usingnode --disable-proto=deleteordeno(in Deno, pollution protection is on by default).
+Matcher: javascript-matcher
+Package URL: pkg:npm/js-yaml@3.14.1
+ + + + + + + + + + + +Upgrade to version: 3.14.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-mh29-5h37-fv8m
+Vulnerability URLs:
+- https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m
+- https://nvd.nist.gov/vuln/detail/CVE-2025-64718
+- https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879
+- https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266
+- https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-64718
+Related Vulnerability URLs:
+- https://github.com/nodeca/js-yaml/commit/383665ff4248ec2192d1274e934462bb30426879
+- https://github.com/nodeca/js-yaml/commit/5278870a17454fe8621dbd8c445c412529525266
+- https://github.com/nodeca/js-yaml/issues/730#issuecomment-3549635876
+- https://github.com/nodeca/js-yaml/security/advisories/GHSA-mh29-5h37-fv8m
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 58 | + +
| File Path | +
|---|
| /src/routes/videoHandler.ts | +
+ + + + + + + + + + + + +Result message: Cannot determine what 'subs' is and it is used with a '<script>' tag. This could be susceptible to cross-site scripting (XSS). Ensure 'subs' is not externally controlled, or sanitize this data.
+ + + + + + + +https://www.developsec.com/2017/11/09/xss-in-a-script-tag/
+https://github.com/juice-shop/juice-shop/blob/1ceb8751e986dacd3214a618c37e7411be6bc11a/routes/videoHandler.ts#L68
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.02% + / + 3.95% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.1.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/express-jwt/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
+Related Vulnerability Description: In versions<=8.5.1ofjsonwebtokenlibrary, lack of algorithm definition in thejwt.verify()function can lead to signature validation bypass due to defaulting to thenonealgorithm for signature verification. Users are affected if you do not specify algorithms in thejwt.verify()function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in thejwt.verify()method. There will be no impact, if you update to version 9.0.0 and you donΓÇÖt need to allow for thenonealgorithm. If you need 'none' algorithm, you have to explicitly specify that injwt.verify()options.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.1.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-qwph-4952-7xr6
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.02% + / + 3.95% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsonwebtoken vulnerable to signature validation bypass due to insecure default algorithm in jwt.verify()
+Related Vulnerability Description: In versions<=8.5.1ofjsonwebtokenlibrary, lack of algorithm definition in thejwt.verify()function can lead to signature validation bypass due to defaulting to thenonealgorithm for signature verification. Users are affected if you do not specify algorithms in thejwt.verify()function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in thejwt.verify()method. There will be no impact, if you update to version 9.0.0 and you donΓÇÖt need to allow for thenonealgorithm. If you need 'none' algorithm, you have to explicitly specify that injwt.verify()options.
+Matcher: javascript-matcher
+Package URL: pkg:npm/jsonwebtoken@0.4.0
+ + + + + + + + + + + +Upgrade to version: 9.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-qwph-4952-7xr6
+Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+- https://security.netapp.com/advisory/ntap-20240621-0007
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+Related Vulnerability URLs:
+- https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+- https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+- https://security.netapp.com/advisory/ntap-20240621-0007/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 17 | + +
| File Path | +
|---|
| /src/frontend/src/app/navbar/navbar.component.html | +
+ + + + + + + + + + + + +Result message: Detected a unquoted template variable as an attribute. If unquoted, a malicious actor could inject custom JavaScript handlers. To fix this, add quotes around the template expression, like this: "{{ expr }}".
+ + + + + + + +https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 400 + + | + + +
| Component | + + +Version | + + +
|---|---|
| moment | + + +2.0.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/express-jwt/node_modules/moment/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +moment.js: regular expression denial of service
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=2.11.2The duration function in the moment package before 2.11.2 for Node.js allows remote attackers to cause a denial of service (CPU consumption) via a long string, aka a "regular expression Denial of Service (ReDoS)."
+ + + + + ++=2.11.2
+
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2016/04/20/11
+http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
+http://www.securityfocus.com/bid/95849
+https://access.redhat.com/security/cve/CVE-2016-4055
+https://github.com/advisories/GHSA-87vv-r9j6-g5qv
+https://github.com/moment/moment
+https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731%40%3Cdev.flink.apache.org%3E
+https://lists.apache.org/thread.html/10f0f3aefd51444d1198c65f44ffdf2d78ca3359423dbc1c168c9731@%3Cdev.flink.apache.org%3E
+https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49%40%3Cuser.flink.apache.org%3E
+https://lists.apache.org/thread.html/17ff53f7999e74fbe3cc0ceb4e1c3b00b180b7c5afec8e978837bc49@%3Cuser.flink.apache.org%3E
+https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2%40%3Cuser.flink.apache.org%3E
+https://lists.apache.org/thread.html/52bafac05ad174000ea465fe275fd3cc7bd5c25535a7631c0bc9bfb2@%3Cuser.flink.apache.org%3E
+https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854%40%3Cuser.flink.apache.org%3E
+https://lists.apache.org/thread.html/54df3aeb4239b64b50b356f0ca6f986e3c4ca5b84c515dce077c7854@%3Cuser.flink.apache.org%3E
+https://nodesecurity.io/advisories/55
+https://nvd.nist.gov/vuln/detail/CVE-2016-4055
+https://ubuntu.com/security/notices/USN-4786-1
+https://www.cve.org/CVERecord?id=CVE-2016-4055
+https://www.npmjs.com/advisories/55
+https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS
+https://www.tenable.com/security/tns-2019-02
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 287 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L
+ + +jsonwebtoken: Insecure default algorithm in jwt.verify() could lead to signature validation bypass
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0In versions
<=8.5.1ofjsonwebtokenlibrary, lack of algorithm definition in thejwt.verify()function can lead to signature validation bypass due to defaulting to thenonealgorithm for signature verification. Users are affected if you do not specify algorithms in thejwt.verify()function. This issue has been fixed, please update to version 9.0.0 which removes the default support for the none algorithm in thejwt.verify()method. There will be no impact, if you update to version 9.0.0 and you don’t need to allow for thenonealgorithm. If you need 'none' algorithm, you have to explicitly specify that injwt.verify()options.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23540
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-qwph-4952-7xr6
+https://nvd.nist.gov/vuln/detail/CVE-2022-23540
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23540
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 287 + + | + + +
| Component | + + +Version | + + +
|---|---|
| jsonwebtoken | + + +0.4.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/jsonwebtoken/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
+ + +jsonwebtoken: Insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 9.0.0jsonwebtoken is an implementation of JSON Web Tokens. Versions
<= 8.5.1ofjsonwebtokenlibrary can be misconfigured so that passing a poorly implemented key retrieval function referring to thesecretOrPublicKeyargument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0.
+ + + + + +9.0.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-23541
+https://github.com/auth0/node-jsonwebtoken
+https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3
+https://github.com/auth0/node-jsonwebtoken/releases/tag/v9.0.0
+https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959
+https://nvd.nist.gov/vuln/detail/CVE-2022-23541
+https://security.netapp.com/advisory/ntap-20240621-0007
+https://security.netapp.com/advisory/ntap-20240621-0007/
+https://www.cve.org/CVERecord?id=CVE-2022-23541
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 74 + + | + + +
| Component | + + +Version | + + +
|---|---|
| vm2 | + + +3.9.17 | + + +
| File Path | +
|---|
| juice-shop/node_modules/vm2/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +vm2: Inspect Manipulation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.9.18vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node
inspectmethod and edit options forconsole.log. As a result a threat actor can edit options for theconsole.logcommand. This vulnerability was patched in the release of version3.9.18ofvm2. Users are advised to upgrade. Users unable to upgrade may make theinspectmethod readonly withvm.readonly(inspect)after creating a vm.
+ + + + + +3.9.18
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2023-32313
+https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
+https://github.com/patriksimek/vm2
+https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238
+https://github.com/patriksimek/vm2/releases/tag/3.9.18
+https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
+https://nvd.nist.gov/vuln/detail/CVE-2023-32313
+https://www.cve.org/CVERecord?id=CVE-2023-32313
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 400 + + | + + +
| Component | + + +Version | + + +
|---|---|
| tar | + + +4.4.19 | + + +
| File Path | +
|---|
| juice-shop/node_modules/node-pre-gyp/node_modules/tar/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + +node-tar: denial of service while parsing a tar file due to lack of folders depth validation
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 6.2.1node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
+ + + + + +6.2.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2024:6147
+https://access.redhat.com/security/cve/CVE-2024-28863
+https://bugzilla.redhat.com/2293200
+https://bugzilla.redhat.com/2296417
+https://bugzilla.redhat.com/show_bug.cgi?id=2293200
+https://bugzilla.redhat.com/show_bug.cgi?id=2296417
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22020
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28863
+https://errata.almalinux.org/9/ALSA-2024-6147.html
+https://errata.rockylinux.org/RLSA-2024:6147
+https://github.com/isaacs/node-tar
+https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7
+https://github.com/isaacs/node-tar/commit/fe8cd57da5686f8695415414bda49206a545f7f7 (v6.2.1)
+https://github.com/isaacs/node-tar/security/advisories/GHSA-f5x3-32g6-xq36
+https://linux.oracle.com/cve/CVE-2024-28863.html
+https://linux.oracle.com/errata/ELSA-2024-6148.html
+https://nvd.nist.gov/vuln/detail/CVE-2024-28863
+https://security.netapp.com/advisory/ntap-20240524-0005
+https://security.netapp.com/advisory/ntap-20240524-0005/
+https://www.cve.org/CVERecord?id=CVE-2024-28863
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 73 + + | + + +
| Line Number | + +
|---|
| 33 | + +
| File Path | +
|---|
| /src/routes/fileServer.ts | +
+ + + + + + + + + + + + +Result message: The application processes user-input, this is passed to res.sendFile which can allow an attacker to arbitrarily read files on the system through path traversal. It is recommended to perform input validation in addition to canonicalizing the path. This allows you to validate the path against the intended directory it should be accessing.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Input_Validation_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Line Number | + +
|---|
| 38 | + +
| File Path | +
|---|
| /juice-shop/frontend/src/app/app.guard.spec.ts | +
+ + + + + + + + + + + + + + + + + + +JWT token
+Category: JWT
+Match: ocalStorage.setItem('token', '***********************')
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.01% + / + 3.07% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: An invalid or NULL pointer dereference can happen in an application processing a malformed PKCS#12 file. Impact summary: An application processing a malformed PKCS#12 file can be caused to dereference an invalid or NULL pointer on memory read, resulting in a Denial of Service. A type confusion vulnerability exists in PKCS#12 parsing code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid pointer read. The location is constrained to a 1-byte address space, meaning any attempted pointer manipulation can only target addresses between 0x00 and 0xFF. This range corresponds to the zero page, which is unmapped on most modern operating systems and will reliably result in a crash, leading only to a Denial of Service. Exploiting this issue also requires a user or application to process a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted PKCS#12 files in applications as they are usually used to store private keys which are trusted by definition. For these reasons, the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS12 implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue. OpenSSL 1.0.2 is not affected by this issue.
+Related Vulnerability Description: Issue summary: An invalid or NULL pointer dereference can happen in
+an application processing a malformed PKCS#12 file.Impact summary: An application processing a malformed PKCS#12 file can be
+
+caused to dereference an invalid or NULL pointer on memory read, resulting
+in a Denial of Service.A type confusion vulnerability exists in PKCS#12 parsing code where
+
+an ASN1_TYPE union member is accessed without first validating the type,
+causing an invalid pointer read.The location is constrained to a 1-byte address space, meaning any
+
+attempted pointer manipulation can only target addresses between 0x00 and 0xFF.
+This range corresponds to the zero page, which is unmapped on most modern
+operating systems and will reliably result in a crash, leading only to a
+Denial of Service. Exploiting this issue also requires a user or application
+to process a maliciously crafted PKCS#12 file. It is uncommon to accept
+untrusted PKCS#12 files in applications as they are usually used to store
+private keys which are trusted by definition. For these reasons, the issue
+was assessed as Low severity.The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
+OpenSSL 1.0.2 is not affected by this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2026-22795
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-22795
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4
+- https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49
+- https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12
+- https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e
+- https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.01% + / + 2.56% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
+ + +Vulnerability Namespace: debian:distro:debian:12
+
+Vulnerability Description: Issue summary: Writing large, newline-free data into a BIO chain using the line-buffering filter where the next BIO performs short writes can trigger a heap-based out-of-bounds write. Impact summary: This out-of-bounds write can cause memory corruption which typically results in a crash, leading to Denial of Service for an application. The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in TLS/SSL data paths. In OpenSSL command-line applications, it is typically only pushed onto stdout/stderr on VMS systems. Third-party applications that explicitly use this filter with a BIO chain that can short-write and that write large, newline-free data influenced by an attacker would be affected. However, the circumstances where this could happen are unlikely to be under attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated data controlled by an attacker. For that reason the issue was assessed as Low severity. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the BIO implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Related Vulnerability Description: Issue summary: Writing large, newline-free data into a BIO chain using the
+line-buffering filter where the next BIO performs short writes can trigger
+a heap-based out-of-bounds write.Impact summary: This out-of-bounds write can cause memory corruption which
+
+typically results in a crash, leading to Denial of Service for an application.The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
+
+TLS/SSL data paths. In OpenSSL command-line applications, it is typically
+only pushed onto stdout/stderr on VMS systems. Third-party applications that
+explicitly use this filter with a BIO chain that can short-write and that
+write large, newline-free data influenced by an attacker would be affected.
+However, the circumstances where this could happen are unlikely to be under
+attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
+data controlled by an attacker. For that reason the issue was assessed as
+Low severity.The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
+
+as the BIO implementation is outside the OpenSSL FIPS module boundary.OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-68160
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-68160
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad
+- https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6
+- https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c
+- https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0
+- https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1321 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +4.17.21 | + + +
| File Path | +
|---|
| juice-shop/node_modules/lodash/package.json | +
+ + +lodash: prototype pollution in .unset and .omit functions
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.17.23Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the .unset and .omit functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.
+The issue permits deletion of properties but does not allow overwriting their original behavior.
+This issue is patched on 4.17.23
+ + + + + +4.17.23
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/errata/RHSA-2026:2452
+https://access.redhat.com/security/cve/CVE-2025-13465
+https://bugzilla.redhat.com/2431740
+https://errata.almalinux.org/9/ALSA-2026-2452.html
+https://github.com/lodash/lodash
+https://github.com/lodash/lodash/commit/edadd452146f7e4bad4ea684e955708931d84d81
+https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg
+https://linux.oracle.com/cve/CVE-2025-13465.html
+https://linux.oracle.com/errata/ELSA-2026-2452.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-13465
+https://www.cve.org/CVERecord?id=CVE-2025-13465
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1321 + + | + + +
| Component | + + +Version | + + +
|---|---|
| notevil | + + +1.3.3 | + + +
| File Path | +
|---|
| juice-shop/node_modules/notevil/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
+ + + + + + +Sandbox escape in notevil and argencoders-notevil
+
+Target: Node.js
+Type: node-pkg
+Fixed version:This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. Note: This vulnerability derives from an incomplete fix in SNYK-JS-NOTEVIL-608878.
+ + + + + + + +affected
+ + + + + + + +https://github.com/mmckegg/notevil
+https://nvd.nist.gov/vuln/detail/CVE-2021-23771
+https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587
+https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 197 | + +
| File Path | +
|---|
| /src/routes/chatbot.ts | +
+ + + + + + + + + + + + +Result message: User data flows into the host portion of this manually-constructed HTML. This can introduce a Cross-Site-Scripting (XSS) vulnerability if this comes from user-provided input. Consider using a sanitization library such as DOMPurify to sanitize the HTML within.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1333 + + | + + +
| Component | + + +Version | + + +
|---|---|
| micromatch | + + +3.1.10 | + + +
| File Path | +
|---|
| juice-shop/node_modules/micromatch/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
+ + +micromatch: vulnerable to Regular Expression Denial of Service
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 4.0.8The NPM package
micromatchprior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs inmicromatch.braces()inindex.jsbecause the pattern.*will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8.
+ + + + + +4.0.8
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-4067
+https://advisory.checkmarx.net/advisory/CVE-2024-4067
+https://advisory.checkmarx.net/advisory/CVE-2024-4067/
+https://devhub.checkmarx.com/cve-details/CVE-2024-4067
+https://devhub.checkmarx.com/cve-details/CVE-2024-4067/
+https://github.com/micromatch/micromatch
+https://github.com/micromatch/micromatch/blob/2c56a8604b68c1099e7bc0f807ce0865a339747a/index.js#L448
+https://github.com/micromatch/micromatch/commit/03aa8052171e878897eee5d7bb2ae0ae83ec2ade
+https://github.com/micromatch/micromatch/commit/500d5d6f42f0e8dfa1cb5464c6cb420b1b6aaaa0
+https://github.com/micromatch/micromatch/issues/243
+https://github.com/micromatch/micromatch/pull/247
+https://github.com/micromatch/micromatch/pull/266
+https://github.com/micromatch/micromatch/releases/tag/4.0.8
+https://nvd.nist.gov/vuln/detail/CVE-2024-4067
+https://www.cve.org/CVERecord?id=CVE-2024-4067
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Component | + + +Version | + + +
|---|---|
| validator | + + +13.15.15 | + + +
| File Path | +
|---|
| juice-shop/node_modules/validator/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +validator.js has a URL validation bypass vulnerability in its isURL function
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 13.15.20A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
+ + + + + +13.15.20
+ + + + + + + +fixed
+ + + + + + + +http://validatorjs.com
+https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666
+https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596
+https://github.com/validatorjs/validator.js
+https://github.com/validatorjs/validator.js/commit/cbef5088f02d36caf978f378bb845fe49bdc0809
+https://github.com/validatorjs/validator.js/issues/2600
+https://github.com/validatorjs/validator.js/pull/2608
+https://github.com/validatorjs/validator.js/releases/tag/13.15.20
+https://nvd.nist.gov/vuln/detail/CVE-2025-56200
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.01% + / + 0.79% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| node | + + +22.18.0 | + + +
| File Path | +
|---|
| /nodejs/bin/node | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + +Vulnerability Namespace: nvd:cpe
+Vulnerability Description: A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed viafutimes()even when the process has only read permissions. Unlikeutimes(),futimes()does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20, v22, v24, and v25.
+Matcher: stock-matcher
+Package URL: pkg:generic/node@22.18.0
+ + + + + + + + + + + +Upgrade to version:
+- 20.20.0
+- 22.22.0
+- 24.13.0
+- 25.3.0
+ + + + + + + +Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-55132
+Vulnerability URL: https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.01% + / + 0.50% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: The regcomp function in the GNU C library version from 2.4 to 2.41 is subject to a double free if some previous allocation fails. It can be accomplished either by a malloc failure or by using an interposed malloc that injects random malloc failures. The double free can allow buffer manipulation depending of how the regex is constructed. This issue affects all architectures and ABIs supported by the GNU C library.
+Related Vulnerability Description: The regcomp function in the GNU C library version from 2.4 to 2.41 is
+subject to a double free if some previous allocation fails. It can be
+accomplished either by a malloc failure or by using an interposed malloc
+ that injects random malloc failures. The double free can allow buffer
+manipulation depending of how the regex is constructed. This issue
+affects all architectures and ABIs supported by the GNU C library.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + + + + + +Upgrade to version: 2.36-9+deb12u13
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-8058
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-8058
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=33185
+- https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
+- http://www.openwall.com/lists/oss-security/2025/07/23/1
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ 0.01% + / + 0.21% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
+ + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: Issue summary: When using the low-level OCB API directly with AES-NI or
other hardware-accelerated code paths, inputs whose length is not a multiple
of 16 bytes can leave the final partial block unencrypted and unauthenticated.
Impact summary: The trailing 1-15 bytes of a message may be exposed in
cleartext on encryption and are not covered by the authentication tag,
allowing an attacker to read or tamper with those bytes without detection.
The low-level OCB encrypt and decrypt routines in the hardware-accelerated
stream path process full 16-byte blocks but do not advance the input/output
pointers. The subsequent tail-handling code then operates on the original
base pointers, effectively reprocessing the beginning of the buffer while
leaving the actual trailing bytes unprocessed. The authentication checksum
also excludes the true tail bytes.
However, typical OpenSSL consumers using EVP are not affected because the
higher-level EVP and provider OCB implementations split inputs so that full
blocks and trailing partial blocks are processed in separate calls, avoiding
the problematic code path. Additionally, TLS does not use OCB ciphersuites.
The vulnerability only affects applications that call the low-level
CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with
non-block-aligned lengths in a single call on hardware-accelerated builds.
For these reasons the issue was assessed as Low severity.
The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected
by this issue, as OCB mode is not a FIPS-approved algorithm.
OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.
OpenSSL 1.0.2 is not affected by this issue.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + + + + + +Upgrade to version: 3.0.18-1~deb12u2
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-69418
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-69418
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc
+- https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8
+- https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347
+- https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae
+- https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977
+- https://openssl-library.org/news/secadv/20260127.txt
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 601 + + | + + +
| Line Number | + +
|---|
| 19 | + +
| File Path | +
|---|
| /src/routes/redirect.ts | +
+ + + + + + + + + + + + +Result message: The application redirects to a URL specified by user-supplied input
querythat is not validated. This could redirect users to malicious locations. Consider using an allow-list approach to validate URLs, or warn users they are being redirected to a third-party website.
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Unvalidated_Redirects_and_Forwards_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| base64url | + + +0.0.6 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/base64url/package.json | +
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: Out-of-bounds Read in base64url
+Matcher: javascript-matcher
+Package URL: pkg:npm/base64url@0.0.6
+ + + + + + + + + + + +Upgrade to version: 3.0.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-rvg8-pwq2-xj7q
+Vulnerability URLs:
+- https://hackerone.com/reports/321687
+- https://github.com/brianloveswords/base64url/pull/25
+- https://github.com/brianloveswords/base64url/commit/4fbd954a0a69e9d898de2146557cc6e893e79542
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 693 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Content Security Policy (CSP) Header Not Set' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Content Security Policy (CSP) Header Not Set' on 'http://localhost:3000/ftp' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Content Security Policy (CSP) Header Not Set' on 'http://localhost:3000/ftp/coupons_2013.md.bak' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Content Security Policy (CSP) Header Not Set' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +Content Security Policy (CSP) is an added layer of security that helps to
+detect and mitigate certain types of attacks, including Cross Site Scripting
+(XSS) and data injection attacks. These attacks are used for everything from
+data theft to site defacement or distribution of malware. CSP provides a set
+of standard HTTP headers that allow website owners to declare approved sources
+of content that browsers should be allowed to load on that page — covered
+types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects
+such as Java applets, ActiveX, audio and video files.
+ + + +Ensure that your web server, application server, load balancer, etc. is
+configured to set the Content-Security-Policy header.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ + + + + + + + + + + +
+ + + + + + + +https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP
+https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
+https://www.w3.org/TR/CSP/
+https://w3c.github.io/webappsec-csp/
+https://web.dev/articles/csp
+https://caniuse.com/#feat=contentsecuritypolicy
+https://content-security-policy.com/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 264 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Cross-Domain Misconfiguration' on 'http://localhost:3000/assets/public/favicon_js.ico' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Domain Misconfiguration' on 'http://localhost:3000/polyfills.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Domain Misconfiguration' on 'http://localhost:3000/robots.txt' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Domain Misconfiguration' on 'http://localhost:3000/runtime.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Domain Misconfiguration' on 'http://localhost:3000/styles.css' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +Web browser data loading may be possible, due to a Cross Origin Resource
+Sharing (CORS) misconfiguration on the web server.
+ + + +Ensure that sensitive data is not available in an unauthenticated manner
+
+(using IP address white-listing, for instance).Configure the "Access-Control-Allow-Origin" HTTP header to a more restrictive
+set of domains, or remove all CORS headers entirely, to allow the web browser
+to enforce the Same Origin Policy (SOP) in a more restrictive manner.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Access-Control-Allow-Origin: *+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Access-Control-Allow-Origin: *+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Access-Control-Allow-Origin: *+ + + + + + + + + + + +
+ + + + + + + +https://vulncat.fortify.com/en/detail?category=HTML5&subcategory;=Overly%20Permissive%20CORS%20Policy
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 798 + + | + + +
| Line Number | + +
|---|
| 56 | + +
| File Path | +
|---|
| /src/lib/insecurity.ts | +
+ + + + + + + + + + + + +Result message: A hard-coded credential was detected. It is not recommended to store credentials in source-code, as this risks secrets being leaked and used by either an internal or external malicious adversary. It is recommended to use environment variables to securely provide credentials or retrieve credentials from a secure vault or HSM (Hardware Security Module).
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Secrets_Management_Cheat_Sheet.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Component | + + +Version | + + +
|---|---|
| sanitize-html | + + +1.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
+ + +XSS - Sanitization not applied recursively
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=1.4.3sanitize-html before 1.4.3 has XSS.
+ + + + + ++=1.4.3
+
+ + + + + + + +fixed
+ + + + + + + +https://github.com/apostrophecms/sanitize-html/commit/762fbc7bba389f3f789cc291c1eb2b64f60f2caf
+https://github.com/apostrophecms/sanitize-html/issues/29
+https://github.com/punkave/sanitize-html/issues/29
+https://nodesecurity.io/advisories/135
+https://nvd.nist.gov/vuln/detail/CVE-2016-1000237
+https://raw.githubusercontent.com/distributedweaknessfiling/cvelist/master/2016/1000xxx/CVE-2016-1000237.json
+https://www.npmjs.com/advisories/135
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 908 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + +glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
+ + + + + + + +affected
+ + + + + + + +http://www.openwall.com/lists/oss-security/2026/01/20/3
+https://access.redhat.com/errata/RHSA-2026:2786
+https://access.redhat.com/security/cve/CVE-2025-15281
+https://bugzilla.redhat.com/2429771
+https://bugzilla.redhat.com/2430201
+https://bugzilla.redhat.com/2431196
+https://errata.almalinux.org/9/ALSA-2026-2786.html
+https://linux.oracle.com/cve/CVE-2025-15281.html
+https://linux.oracle.com/errata/ELSA-2026-50120.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-15281
+https://sourceware.org/bugzilla/show_bug.cgi?id=33814
+https://ubuntu.com/security/notices/USN-8005-1
+https://www.cve.org/CVERecord?id=CVE-2025-15281
+https://www.openwall.com/lists/oss-security/2026/01/20/3
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 415 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
+ + +glibc: Double free in glibc
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 2.36-9+deb12u13The regcomp function in the GNU C library version from 2.4 to 2.41 is
+subject to a double free if some previous allocation fails. It can be
+accomplished either by a malloc failure or by using an interposed malloc
+ that injects random malloc failures. The double free can allow buffer
+manipulation depending of how the regex is constructed. This issue
+affects all architectures and ABIs supported by the GNU C library.
+ + + + + +2.36-9+deb12u13
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2025/07/23/1
+https://access.redhat.com/errata/RHSA-2025:12980
+https://access.redhat.com/security/cve/CVE-2025-8058
+https://bugzilla.redhat.com/2383146
+https://bugzilla.redhat.com/show_bug.cgi?id=2383146
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058
+https://errata.almalinux.org/8/ALSA-2025-12980.html
+https://errata.rockylinux.org/RLSA-2025:12748
+https://linux.oracle.com/cve/CVE-2025-8058.html
+https://linux.oracle.com/errata/ELSA-2025-28054.html
+https://nvd.nist.gov/vuln/detail/CVE-2025-8058
+https://sourceware.org/bugzilla/show_bug.cgi?id=33185
+https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2025-0005
+https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f
+https://ubuntu.com/security/notices/USN-7760-1
+https://ubuntu.com/security/notices/USN-8005-1
+https://www.cve.org/CVERecord?id=CVE-2025-8058
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 908 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + + + +glibc: glibc: Information disclosure via zero-valued network query
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
+ + + + + + + +affected
+ + + + + + + +http://www.openwall.com/lists/oss-security/2026/01/16/6
+https://access.redhat.com/errata/RHSA-2026:2786
+https://access.redhat.com/security/cve/CVE-2026-0915
+https://bugzilla.redhat.com/2429771
+https://bugzilla.redhat.com/2430201
+https://bugzilla.redhat.com/2431196
+https://bugzilla.redhat.com/show_bug.cgi?id=2429771
+https://bugzilla.redhat.com/show_bug.cgi?id=2430201
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861
+https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915
+https://errata.almalinux.org/9/ALSA-2026-2786.html
+https://errata.rockylinux.org/RLSA-2026:1334
+https://linux.oracle.com/cve/CVE-2026-0915.html
+https://linux.oracle.com/errata/ELSA-2026-50120.html
+https://nvd.nist.gov/vuln/detail/CVE-2026-0915
+https://sourceware.org/bugzilla/show_bug.cgi?id=33802
+https://ubuntu.com/security/notices/USN-8005-1
+https://www.cve.org/CVERecord?id=CVE-2026-0915
+https://www.openwall.com/lists/oss-security/2026/01/16/6
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Prometheus Metrics - Detect' on 'http://localhost:3000/metrics' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + +Prometheus metrics page was detected.
GET /metrics HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.2 Safari/605.1.15 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Content-Length: 24400
+Content-Type: text/plain; version=0.0.4; charset=utf-8
+Date: Sat, 28 Feb 2026 17:22:22 GMT
+# HELP file_uploads_count Total number of successful file uploads grouped by file type.
+# TYPE file_uploads_count counter
+# HELP file_upload_errors Total number of failed file uploads grouped by file type.
+# TYPE file_upload_errors counter
+# HELP juiceshop_startup_duration_seconds Duration juiceshop required to perform a certain task during startup
+# TYPE juiceshop_startup_duration_seconds gauge
+juiceshop_startup_duration_seconds{task="validateConfig",app="juiceshop"} 0.023248514
+juiceshop_startup_duration_seconds{task="cleanupFtpFolder",app="juiceshop"} 0.048933483
+juiceshop_startup_duration_seconds{task="validatePreconditions",app="juice…
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/15.2 Safari/605.1.15' 'http://localhost:3000/metrics'
+ + + + + + + +https://github.com/prometheus/prometheus
+https://hackerone.com/reports/1026196
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Medium + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 79 + + | + + +
| Line Number | + +
|---|
| 21 | + +
| File Path | +
|---|
| /src/views/dataErasureForm.hbs | +
+ + + + + + + + + + + + +Result message: Detected a unquoted template variable as an attribute. If unquoted, a malicious actor could inject custom JavaScript handlers. To fix this, add quotes around the template expression, like this: "{{ expr }}".
+ + + + + + + +https://flask.palletsprojects.com/en/1.1.x/security/#cross-site-scripting-xss
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 399 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + + + + + +glibc: glob implementation can cause excessive CPU and memory consumption due to crafted glob expressions
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
+ + + + + + + +affected
+ + + + + + + +http://cxib.net/stuff/glob-0day.c
+http://securityreason.com/achievement_securityalert/89
+http://securityreason.com/exploitalert/9223
+https://access.redhat.com/security/cve/CVE-2010-4756
+https://bugzilla.redhat.com/show_bug.cgi?id=681681
+https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
+https://nvd.nist.gov/vuln/detail/CVE-2010-4756
+https://security.netapp.com/advisory/ntap-20241108-0002/
+https://www.cve.org/CVERecord?id=CVE-2010-4756
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + +glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\1\1|t1|\\2537)+' in grep.
+ + + + + + + +affected
+ + + + + + + +http://www.securityfocus.com/bid/107160
+https://access.redhat.com/security/cve/CVE-2018-20796
+https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
+https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
+https://nvd.nist.gov/vuln/detail/CVE-2018-20796
+https://security.netapp.com/advisory/ntap-20190315-0002/
+https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
+https://www.cve.org/CVERecord?id=CVE-2018-20796
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 119 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + +glibc: stack guard protection bypass
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2019-1010022
+https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
+https://security-tracker.debian.org/tracker/CVE-2019-1010022
+https://sourceware.org/bugzilla/show_bug.cgi?id=22850
+https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
+https://ubuntu.com/security/CVE-2019-1010022
+https://www.cve.org/CVERecord?id=CVE-2019-1010022
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+ + + + + + +glibc: running ldd on malicious ELF leads to code execution because of wrong size computation
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+ + + + + + + +affected
+ + + + + + + +http://www.securityfocus.com/bid/109167
+https://access.redhat.com/security/cve/CVE-2019-1010023
+https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
+https://security-tracker.debian.org/tracker/CVE-2019-1010023
+https://sourceware.org/bugzilla/show_bug.cgi?id=22851
+https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
+https://ubuntu.com/security/CVE-2019-1010023
+https://www.cve.org/CVERecord?id=CVE-2019-1010023
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + + + +glibc: ASLR bypass using cache of thread stack and heap
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+ + + + + + + +affected
+ + + + + + + +http://www.securityfocus.com/bid/109162
+https://access.redhat.com/security/cve/CVE-2019-1010024
+https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
+https://security-tracker.debian.org/tracker/CVE-2019-1010024
+https://sourceware.org/bugzilla/show_bug.cgi?id=22852
+https://support.f5.com/csp/article/K06046097
+https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
+https://ubuntu.com/security/CVE-2019-1010024
+https://www.cve.org/CVERecord?id=CVE-2019-1010024
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + +glibc: uncontrolled recursion in function check_dst_limits_calc_pos_1 in posix/regexec.c
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\1\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2019-9192
+https://nvd.nist.gov/vuln/detail/CVE-2019-9192
+https://sourceware.org/bugzilla/show_bug.cgi?id=24269
+https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
+https://www.cve.org/CVERecord?id=CVE-2019-9192
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libgcc-s1 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + +binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-27943
+https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
+https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+https://sourceware.org/bugzilla/show_bug.cgi?id=28995
+https://www.cve.org/CVERecord?id=CVE-2022-27943
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 20 + + | + + +
| Component | + + +Version | + + +
|---|---|
| qs | + + +6.13.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/qs/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
+ + +qs: qs's arrayLimit bypass in comma parsing allows denial of service
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 6.14.2Summary
+The
+arrayLimitoption in qs does not enforce limits for comma-separated values whencomma: trueis enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284).Details
+When the
+commaoption is set totrue(not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g.,?param=a,b,cbecomes['a', 'b', 'c']). However, the limit check forarrayLimit(default: 20) and the optional throwOnLimitExceeded occur after the comma-handling logic inparseArrayValue, enabling a bypass. This permits creation of arbitrarily large arrays from a single parameter, leading to excessive memory allocation.Vulnerable code (lib/parse.js: lines ~40-50):
++ +if (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) { + return val.split(','); +} + +if (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) { + throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.'); +} + +return val; +The
+split(',')returns the array immediately, skipping the subsequent limit check. Downstream merging viautils.combinedoes not prevent allocation, even if it marks overflows for sparse arrays.This discrepancy allows attackers to send a single parameter with millions of commas (e.g.,?param=,,,,,,,,...), allocating massive arrays in memory without triggering limits. It bypasses the intent ofarrayLimit, which is enforced correctly for indexed (a[0]=) and bracket (a[]=) notations (the latter fixed in v6.14.1 per GHSA-6rw7-vpxm-498p).PoC
+Test 1 - Basic bypass:
++ +npm install qs ++ +const qs = require('qs'); + +const payload = 'a=' + ','.repeat(25); // 26 elements after split (bypasses arrayLimit: 5) +const options = { comma: true, arrayLimit: 5, throwOnLimitExceeded: true }; + +try { + const result = qs.parse(payload, options); + console.log(result.a.length); // Outputs: 26 (bypass successful) +} catch (e) { + console.log('Limit enforced:', e.message); // Not thrown +} +Configuration:
+
+-comma: true
+-arrayLimit: 5
+-throwOnLimitExceeded: trueExpected: Throws "Array limit exceeded" error.
+
+Actual: Parses successfully, creating an array of length 26.Impact
+Denial of Service (DoS) via memory exhaustion.
+ + + + + +6.14.2
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-2391
+https://github.com/ljharb/qs
+https://github.com/ljharb/qs/commit/f6a7abff1f13d644db9b05fe4f2c98ada6bf8482
+https://github.com/ljharb/qs/security/advisories/GHSA-w7fw-mjwx-w883
+https://nvd.nist.gov/vuln/detail/CVE-2026-2391
+https://www.cve.org/CVERecord?id=CVE-2026-2391
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 74 + + | + + +
| Component | + + +Version | + + +
|---|---|
| cookie | + + +0.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/engine.io/node_modules/cookie/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
+ + +cookie: cookie accepts cookie name, path, and domain with out of bounds characters
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 0.7.0cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
+ + + + + +0.7.0
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2024-47764
+https://github.com/jshttp/cookie
+https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
+https://github.com/jshttp/cookie/pull/167
+https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
+https://nvd.nist.gov/vuln/detail/CVE-2024-47764
+https://www.cve.org/CVERecord?id=CVE-2024-47764
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Low + + + | ++ 0.02% + / + 4.88% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| diff | + + +4.0.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/ts-node-dev/node_modules/diff/package.json | +
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: jsdiff has a Denial of Service vulnerability in parsePatch and applyPatch
+Related Vulnerability Description: jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters\r,\u2028, or\u2029can cause theparsePatchmethod to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they callparsePatchwith a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when callingparsePatchon a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). TheapplyPatchmethod is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string usingparsePatch. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's patch header (also known as its "leading garbage"). A maliciously-crafted patch header of length n can takeparsePatchO(n┬│) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters:\r,\u2028, or\u2029.
+Matcher: javascript-matcher
+Package URL: pkg:npm/diff@4.0.2
+ + + + + + + + + + + +Upgrade to version: 4.0.4
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-73rr-hh4g-fpgx
+Vulnerability URLs:
+- https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx
+- https://github.com/kpdecker/jsdiff/pull/649
+- https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5
+- https://github.com/kpdecker/jsdiff/issues/653
+- https://nvd.nist.gov/vuln/detail/CVE-2026-24001
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-24001
+Related Vulnerability URLs:
+- https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5
+- https://github.com/kpdecker/jsdiff/issues/653
+- https://github.com/kpdecker/jsdiff/pull/649
+- https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Low + + + | ++ 0.21% + / + 42.50% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| cookie | + + +0.4.2 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/engine.io/node_modules/cookie/package.json | +
+ + +Vulnerability Namespace: github:language:javascript
+Vulnerability Description: cookie accepts cookie name, path, and domain with out of bounds characters
+Related Vulnerability Description: cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
+Matcher: javascript-matcher
+Package URL: pkg:npm/cookie@0.4.2
+ + + + + + + + + + + +Upgrade to version: 0.7.0
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-pxg6-pf52-xh8x
+Vulnerability URLs:
+- https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
+- https://github.com/jshttp/cookie/pull/167
+- https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2024-47764
+Related Vulnerability URLs:
+- https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c
+- https://github.com/jshttp/cookie/pull/167
+- https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 829 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Cross-Domain JavaScript Source File Inclusion' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Domain JavaScript Source File Inclusion' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The page includes one or more script files from a third-party domain.
+ + + +Ensure JavaScript source files are loaded from only trusted sources, and the
+sources can't be controlled by end users of the application.
Method: GET +Param: //cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>+ + +
Method: GET +Param: //cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>+ + +
Method: GET +Param: //cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>+ + + + + + + + + + + +
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 693 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Cross-Origin-Embedder-Policy Header Missing or Invalid' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Embedder-Policy Header Missing or Invalid' on 'http://localhost:3000/ftp' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Embedder-Policy Header Missing or Invalid' on 'http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Embedder-Policy Header Missing or Invalid' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +Cross-Origin-Embedder-Policy header is a response header that prevents a
+document from loading any cross-origin resources that don't explicitly grant
+the document permission (using CORP or CORS).
+ + + +Ensure that the application/web server sets the Cross-Origin-Embedder-Policy
+
+header appropriately, and that it sets the Cross-Origin-Embedder-Policy header
+to 'require-corp' for documents.If possible, ensure that the end user uses a standards-compliant and modern
+web browser that supports the Cross-Origin-Embedder-Policy header
+(https://caniuse.com/mdn-http_headers_cross-origin-embedder-policy).
Method: GET +Param: Cross-Origin-Embedder-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: Cross-Origin-Embedder-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: Cross-Origin-Embedder-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + + + + + + + + + + +
+ + + + + + + +https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-
+Origin-Embedder-Policy
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 693 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Cross-Origin-Opener-Policy Header Missing or Invalid' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Opener-Policy Header Missing or Invalid' on 'http://localhost:3000/ftp' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Opener-Policy Header Missing or Invalid' on 'http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Cross-Origin-Opener-Policy Header Missing or Invalid' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +Cross-Origin-Opener-Policy header is a response header that allows a site to
+control if others included documents share the same browsing context. Sharing
+the same browsing context with untrusted documents might lead to data leak.
+ + + +Ensure that the application/web server sets the Cross-Origin-Opener-Policy
+
+header appropriately, and that it sets the Cross-Origin-Opener-Policy header
+to 'same-origin' for documents.'same-origin-allow-popups' is considered as less secured and should be
+
+avoided.If possible, ensure that the end user uses a standards-compliant and modern
+web browser that supports the Cross-Origin-Opener-Policy header
+(https://caniuse.com/mdn-http_headers_cross-origin-opener-policy).
Method: GET +Param: Cross-Origin-Opener-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: Cross-Origin-Opener-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: Cross-Origin-Opener-Policy +Attack: +EndpointQuery: +EndpointFragment:+ + + + + + + + + + + +
+ + + + + + + +https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-
+Origin-Opener-Policy
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 749 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Dangerous JS Functions' on 'http://localhost:3000/main.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Dangerous JS Functions' on 'http://localhost:3000/vendor.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +A dangerous JS function seems to be in use that would leave the site
+vulnerable.
+ + + +See the references for security advice on the use of these functions.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
bypassSecurityTrustHtml(+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
bypassSecurityTrustHtml(+ + + + + + + + + + + +
+ + + + + + + +https://v17.angular.io/guide/security
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 16 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Deprecated Feature Policy Header Set' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Deprecated Feature Policy Header Set' on 'http://localhost:3000/main.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Deprecated Feature Policy Header Set' on 'http://localhost:3000/polyfills.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Deprecated Feature Policy Header Set' on 'http://localhost:3000/runtime.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Deprecated Feature Policy Header Set' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The header has now been renamed to Permissions-Policy.
+ + + +Ensure that your web server, application server, load balancer, etc. is
+configured to set the Permissions-Policy header instead of the Feature-Policy
+header.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Feature-Policy+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Feature-Policy+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
Feature-Policy+ + + + + + + + + + + +
+ + + + + + + +https://developer.mozilla.org/en-
+
+US/docs/Web/HTTP/Reference/Headers/Permissions-Policyhttps://scotthelme.co.uk/goodbye-feature-policy-and-hello-permissions-policy/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 497 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Timestamp Disclosure - Unix' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Timestamp Disclosure - Unix' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +A timestamp was disclosed by the application/web server. - Unix
+ + + +Manually confirm that the timestamp data is not sensitive, and that the data
+cannot be aggregated to disclose exploitable patterns.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
1650485437+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
1981395349+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
2038834951+ + + + + + + + + + + +
+ + + + + + + +https://cwe.mitre.org/data/definitions/200.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'DNS Rebinding Attack' on 'localhost' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Detects DNS Rebinding attacks by checking if the DNS response contains a private IPv4 or IPv6 address.
+Results:
+127.0.0.1
;; opcode: QUERY, status: NOERROR, id: 2462 +;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 + +;; QUESTION SECTION: +;localhost. IN A ++ +
;; opcode: QUERY, status: NOERROR, id: 2462 +;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 +;; QUESTION SECTION: +;localhost. IN A +;; ANSWER SECTION: +localhost. 10800 IN A 127.0.0.1 ++ + + + + + + + + + + +
+ + + + + + + +https://capec.mitre.org/data/definitions/275.html
+https://payatu.com/blog/dns-rebinding/
+https://heimdalsecurity.com/blog/dns-rebinding/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 1321 + + | + + +
| Component | + + +Version | + + +
|---|---|
| messageformat | + + +2.3.0 | + + +
| File Path | +
|---|
| juice-shop/node_modules/messageformat/package.json | +
+ + +messageformat has a prototype pollution vulnerability
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 3.0.0-beta.0The messageformat package, an implementation of the Unicode MessageFormat 2 specification for JavaScript, is vulnerable to prototype pollution due to improper handling of message key paths in versions prior to 2.3.0. The flaw arises when processing nested message keys containing special characters (e.g., proto ), which can lead to unintended modification of the JavaScript Object prototype. This vulnerability may allow a remote attacker to inject properties into the global object prototype via specially crafted message input, potentially causing denial of service or other undefined behaviors in applications using the affected component.
+ + + + + +3.0.0-beta.0
+ + + + + + + +fixed
+ + + + + + + +https://github.com/messageformat/messageformat
+https://github.com/messageformat/messageformat/issues/452
+https://nvd.nist.gov/vuln/detail/CVE-2025-57349
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 400 + + | + + +
| Component | + + +Version | + + +
|---|---|
| diff | + + +4.0.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/ts-node-dev/node_modules/diff/package.json | +
+ + +jsdiff: denial of service vulnerability in parsePatch and applyPatch
+
+Target: Node.js
+Type: node-pkg
+Fixed version: 8.0.3, 5.2.2, 4.0.4, 3.5.1jsdiff is a JavaScript text differencing implementation. Prior to versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1, attempting to parse a patch whose filename headers contain the line break characters
\r,\u2028, or\u2029can cause theparsePatchmethod to enter an infinite loop. It then consumes memory without limit until the process crashes due to running out of memory. Applications are therefore likely to be vulnerable to a denial-of-service attack if they callparsePatchwith a user-provided patch as input. A large payload is not needed to trigger the vulnerability, so size limits on user input do not provide any protection. Furthermore, some applications may be vulnerable even when callingparsePatchon a patch generated by the application itself if the user is nonetheless able to control the filename headers (e.g. by directly providing the filenames of the files to be diffed). TheapplyPatchmethod is similarly affected if (and only if) called with a string representation of a patch as an argument, since under the hood it parses that string usingparsePatch. Other methods of the library are unaffected. Finally, a second and lesser interdependent bug - a ReDOS - also exhibits when those same line break characters are present in a patch's patch header (also known as its "leading garbage"). A maliciously-crafted patch header of length n can takeparsePatchO(n³) time to parse. Versions 8.0.3, 5.2.2, 4.0.4, and 3.5.1 contain a fix. As a workaround, do not attempt to parse patches that contain any of these characters:\r,\u2028, or\u2029.
+ + + + + +8.0.3, 5.2.2, 4.0.4, 3.5.1
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2026-24001
+https://github.com/kpdecker/jsdiff
+https://github.com/kpdecker/jsdiff/commit/15a1585230748c8ae6f8274c202e0c87309142f5
+https://github.com/kpdecker/jsdiff/issues/653
+https://github.com/kpdecker/jsdiff/pull/649
+https://github.com/kpdecker/jsdiff/security/advisories/GHSA-73rr-hh4g-fpgx
+https://nvd.nist.gov/vuln/detail/CVE-2026-24001
+https://www.cve.org/CVERecord?id=CVE-2026-24001
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 471 + + | + + +
| Component | + + +Version | + + +
|---|---|
| lodash | + + +2.4.2 | + + +
| File Path | +
|---|
| juice-shop/node_modules/sanitize-html/node_modules/lodash/package.json | +
+ + +CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
+ + +lodash: Prototype pollution in utilities function
+
+Target: Node.js
+Type: node-pkg
+Fixed version: >=4.17.5lodash node module before 4.17.5 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via defaultsDeep, merge, and mergeWith functions, which allows a malicious user to modify the prototype of "Object" via proto, causing the addition or modification of an existing property that will exist on all objects.
+ + + + + ++=4.17.5
+
+ + + + + + + +fixed
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2018-3721
+https://github.com/advisories/GHSA-fvqr-27wr-82fm
+https://github.com/lodash/lodash/commit/d8e069cc3410082e44eb18fcf8e7f3d08ebe1d4a
+https://github.com/rubysec/ruby-advisory-db/blob/master/gems/lodash-rails/CVE-2018-3721.yml
+https://hackerone.com/reports/310443
+https://nvd.nist.gov/vuln/detail/CVE-2018-3721
+https://security.netapp.com/advisory/ntap-20190919-0004
+https://security.netapp.com/advisory/ntap-20190919-0004/
+https://snyk.io/vuln/npm:lodash:20180130
+https://www.cve.org/CVERecord?id=CVE-2018-3721
+https://www.npmjs.com/advisories/577
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| gcc-12-base | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + +binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-27943
+https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
+https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+https://sourceware.org/bugzilla/show_bug.cgi?id=28995
+https://www.cve.org/CVERecord?id=CVE-2022-27943
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 385 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + + + + + +OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable ...
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.
+ + + + + + + +affected
+ + + + + + + +https://github.com/openssl/openssl/issues/24253
+https://minerva.crocs.fi.muni.cz
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libgomp1 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + +binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-27943
+https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
+https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+https://sourceware.org/bugzilla/show_bug.cgi?id=28995
+https://www.cve.org/CVERecord?id=CVE-2022-27943
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 125 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
+ + +openssl: Out-of-bounds read in HTTP client no_proxy handling
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version: 3.0.17-1~deb12u3Issue summary: An application using the OpenSSL HTTP client API functions may
+
+trigger an out-of-bounds read if the 'no_proxy' environment variable is set and
+the host portion of the authority component of the HTTP URL is an IPv6 address.Impact summary: An out-of-bounds read can trigger a crash which leads to
+
+Denial of Service for an application.The OpenSSL HTTP client API functions can be used directly by applications
+
+but they are also used by the OCSP client functions and CMP (Certificate
+Management Protocol) client implementation in OpenSSL. However the URLs used
+by these implementations are unlikely to be controlled by an attacker.In this vulnerable code the out of bounds read can only trigger a crash.
+
+Furthermore the vulnerability requires an attacker-controlled URL to be
+passed from an application to the OpenSSL function and the user has to have
+a 'no_proxy' environment variable set. For the aforementioned reasons the
+issue was assessed as Low severity.The vulnerable code was introduced in the following patch releases:
+
+3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
+issue, as the HTTP client implementation is outside the OpenSSL FIPS module
+boundary.
+ + + + + +3.0.17-1~deb12u3
+ + + + + + + +fixed
+ + + + + + + +http://www.openwall.com/lists/oss-security/2025/09/30/5
+https://access.redhat.com/security/cve/CVE-2025-9232
+https://github.com/openssl/openssl/commit/2b4ec20e47959170422922eaff25346d362dcb35
+https://github.com/openssl/openssl/commit/654dc11d23468a74fc8ea4672b702dd3feb7be4b
+https://github.com/openssl/openssl/commit/7cf21a30513c9e43c4bc3836c237cf086e194af3
+https://github.com/openssl/openssl/commit/89e790ac431125a4849992858490bed6b225eadf
+https://github.com/openssl/openssl/commit/bbf38c034cdabd0a13330abcc4855c866f53d2e0
+https://nvd.nist.gov/vuln/detail/CVE-2025-9232
+https://openssl-library.org/news/secadv/20250930.txt
+https://ubuntu.com/security/notices/USN-7786-1
+https://ubuntu.com/security/notices/USN-7894-1
+https://www.cve.org/CVERecord?id=CVE-2025-9232
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 674 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libstdc++6 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + +binutils: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack exhaustion in demangle_const
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2022-27943
+https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=1a770b01ef415e114164b6151d1e55acdee09371
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=9234cdca6ee88badfc00297e72f13dac4e540c79
+https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=fc968115a742d9e4674d9725ce9c2106b91b6ead
+https://gcc.gnu.org/pipermail/gcc-patches/2022-March/592244.html
+https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+https://sourceware.org/bugzilla/show_bug.cgi?id=28995
+https://www.cve.org/CVERecord?id=CVE-2022-27943
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Low + + + | ++ 0.02% + / + 4.60% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| qs | + + +6.13.0 | + + +
| File Path | +
|---|
| /juice-shop/node_modules/qs/package.json | +
+ + +CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
+ + +Vulnerability Namespace: github:language:javascript
+
+Vulnerability Description: qs's arrayLimit bypass in comma parsing allows denial of service
+Related Vulnerability Description: ### Summary
+ThearrayLimitoption in qs does not enforce limits for comma-separated values whencomma: trueis enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284).Details
+When the
+commaoption is set totrue(not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g.,?param=a,b,cbecomes['a', 'b', 'c']). However, the limit check forarrayLimit(default: 20) and the optional throwOnLimitExceeded occur after the comma-handling logic inparseArrayValue, enabling a bypass. This permits creation of arbitrarily large arrays from a single parameter, leading to excessive memory allocation.Vulnerable code (lib/parse.js: lines ~40-50):
++ +if (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) { +    return val.split(','); +} + +if (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) { +    throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.'); +} + +return val; +The
+split(',')returns the array immediately, skipping the subsequent limit check. Downstream merging viautils.combinedoes not prevent allocation, even if it marks overflows for sparse arrays.This discrepancy allows attackers to send a single parameter with millions of commas (e.g.,?param=,,,,,,,,...), allocating massive arrays in memory without triggering limits. It bypasses the intent ofarrayLimit, which is enforced correctly for indexed (a[0]=) and bracket (a[]=) notations (the latter fixed in v6.14.1 per GHSA-6rw7-vpxm-498p).PoC
+Test 1 - Basic bypass:
++ +npm install qs ++ +const qs = require('qs'); + +const payload = 'a=' + ','.repeat(25); // 26 elements after split (bypasses arrayLimit: 5) +const options = { comma: true, arrayLimit: 5, throwOnLimitExceeded: true }; + +try { +  const result = qs.parse(payload, options); +  console.log(result.a.length); // Outputs: 26 (bypass successful) +} catch (e) { +  console.log('Limit enforced:', e.message); // Not thrown +} +Configuration:
+
+-comma: true
+-arrayLimit: 5
+-throwOnLimitExceeded: trueExpected: Throws "Array limit exceeded" error.
+
+Actual: Parses successfully, creating an array of length 26.Impact
+Denial of Service (DoS) via memory exhaustion.
+Matcher: javascript-matcher
+Package URL: pkg:npm/qs@6.13.0
+ + + + + + + + + + + +Upgrade to version: 6.14.2
+ + + + + + + +Vulnerability Datasource: https://github.com/advisories/GHSA-w7fw-mjwx-w883
+Vulnerability URLs:
+- https://github.com/ljharb/qs/security/advisories/GHSA-w7fw-mjwx-w883
+- https://nvd.nist.gov/vuln/detail/CVE-2026-2391
+- https://github.com/ljharb/qs/commit/f6a7abff1f13d644db9b05fe4f2c98ada6bf8482
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2026-2391
+Related Vulnerability URLs:
+- https://github.com/ljharb/qs/commit/f6a7abff1f13d644db9b05fe4f2c98ada6bf8482
+- https://github.com/ljharb/qs/security/advisories/GHSA-w7fw-mjwx-w883
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Low + + + | ++ N.A. + / + N.A. + | +Active, Verified | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 330 + + | + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| bkimminich/juice-shop:v19.0.0 (debian 12.11) | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + + + +glibc: information disclosure of heap addresses of pthread_created thread
+
+Target: bkimminich/juice-shop:v19.0.0 (debian 12.11)
+Type: debian
+Fixed version:GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.
+ + + + + + + +affected
+ + + + + + + +https://access.redhat.com/security/cve/CVE-2019-1010025
+https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
+https://security-tracker.debian.org/tracker/CVE-2019-1010025
+https://sourceware.org/bugzilla/show_bug.cgi?id=22853
+https://support.f5.com/csp/article/K06046097
+https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
+https://ubuntu.com/security/CVE-2019-1010025
+https://www.cve.org/CVERecord?id=CVE-2019-1010025
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.13% + / + 32.79% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2019-1010022
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-1010022
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=22850
+- https://sourceware.org/bugzilla/show_bug.cgi?id=22850#c3
+- https://ubuntu.com/security/CVE-2019-1010022
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Deprecated Feature-Policy Header - Detection' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Detected the presence of the deprecated Feature-Policy HTTP response header. The Feature-Policy header has been deprecated and replaced by the Permissions-Policy header. While Feature-Policy is still supported in some browsers for backward compatibility, it is recommended to migrate to Permissions-Policy for future-proofing web applications.
+Results:
+payment 'self'
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:22:04 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36' 'http://localhost:3000'
+ + + + + + + +https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Feature-Policy
+https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Permissions-Policy
+https://www.w3.org/TR/permissions-policy-1/
+https://github.com/w3c/webappsec-permissions-policy/blob/main/permissions-policy-explainer.md
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'OWASP Juice Shop' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
None+ + + + +
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:22:04 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'security.txt File' on 'http://localhost:3000/.well-known/security.txt' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +File similar to robots.txt but intended to be read by humans wishing to contact a website’s owner about security issues. Often defines a security policy and contact details.
+Results:
+ mailto:donotreply@owasp-juice.shop
GET /.well-known/security.txt HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (X11; Linux i686; rv:1.9.7.20) Gecko/ Firefox/14.0 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK +Connection: close +Content-Length: 475 +Access-Control-Allow-Origin: * +Content-Type: text/plain; charset=utf-8 +Date: Sat, 28 Feb 2026 17:22:10 GMT +Etag: W/"1db-pWmvMoPKPkH/x2OXbIl38OzH2eg" +Feature-Policy: payment 'self' +Vary: Accept-Encoding +X-Content-Type-Options: nosniff +X-Frame-Options: SAMEORIGIN +X-Recruiting: /#/jobs +Contact: mailto:donotreply@owasp-juice.shop +Encryption: https://keybase.io/bkimminich/pgp_keys.asc?fingerprint=19c01cb7157e4645e9e2c863062a85a8cbfbdcda +Acknowledgements: /#/score-board +Preferred-languages: en, ar, az, bg, bn, ca, cs, da, de, ga, el, es, et, fi, fr, ka, he, hi, hu, id, it, ja, ko, lv, my, nl, no, pl, pt, ro, ru, si, sv, th, tr, uk, zh +Hiring: /#/jobs +Csaf: http://localhost:3000/.well-known/csaf/provider-metadata.json +Expires: Sun…+ + + + + + + +
+ + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (X11; Linux i686; rv:1.9.7.20) Gecko/ Firefox/14.0' 'http://localhost:3000/.well-known/security.txt'
+ + + + + + + +https://securitytxt.org/
+https://community.turgensec.com/security-txt-progress-in-ethical-security-research/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'AAAA Record - IPv6 Detection' on 'localhost' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +An AAAA record was detected. AAAA records are used to map domain names to IPv6 addresses.
+Results:
+::1
;; opcode: QUERY, status: NOERROR, id: 40907 +;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 + +;; QUESTION SECTION: +;localhost. IN AAAA ++ +
;; opcode: QUERY, status: NOERROR, id: 40907 +;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 +;; QUESTION SECTION: +;localhost. IN AAAA +;; ANSWER SECTION: +localhost. 10800 IN AAAA ::1 ++ + + + + + + + + + + +
+ + + + + + + +https://www.cloudflare.com/learning/dns/dns-records/dns-aaaa-record/
+https://en.wikipedia.org/wiki/IPv6_address
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'CAA Record' on 'localhost' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +A CAA record was discovered. A CAA record is used to specify which certificate authorities (CAs) are allowed to issue certificates for a domain.
;; opcode: QUERY, status: NOERROR, id: 23423 +;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 + +;; QUESTION SECTION: +;localhost. IN CAA ++ +
;; opcode: QUERY, status: NOERROR, id: 23423 +;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 +;; QUESTION SECTION: +;localhost. IN CAA +;; AUTHORITY SECTION: +localhost. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800 ++ + + + + + + + + + + +
+ + + + + + + +https://support.dnsimple.com/articles/caa-record/#whats-a-caa-record
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'NS Record Detection' on 'localhost' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +An NS record was detected. An NS record delegates a subdomain to a set of name servers.
+Results:
+localhost.
;; opcode: QUERY, status: NOERROR, id: 9066 +;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 + +;; QUESTION SECTION: +;localhost. IN NS ++ +
;; opcode: QUERY, status: NOERROR, id: 9066 +;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 +;; QUESTION SECTION: +;localhost. IN NS +;; ANSWER SECTION: +localhost. 10800 IN NS localhost. ++ + + + + + + + + + + + + + + + + +
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.65% + / + 70.33% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2019-1010024
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-1010024
+Related Vulnerability URLs:
+- http://www.securityfocus.com/bid/109162
+- https://sourceware.org/bugzilla/show_bug.cgi?id=22852
+- https://support.f5.com/csp/article/K06046097
+- https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
+- https://ubuntu.com/security/CVE-2019-1010024
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Add DOM EventListener - Detection' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Identifies the use of JavaScript addEventListener calls in the DOM.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:22:04 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36' 'http://localhost:3000'
+ + + + + + + +https://portswigger.net/web-security/dom-based/controlling-the-web-message-source
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Public Swagger API - Detect' on 'http://localhost:3000/api-docs/swagger.json' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + +CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
+ + + + +Public Swagger API was detected.
GET /api-docs/swagger.json HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0 +Accept: text/html, application/json +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Access-Control-Allow-Origin: *
+Content-Type: text/html; charset=utf-8
+Date: Sat, 28 Feb 2026 17:20:52 GMT
+Etag: W/"c22-H8FH9nKD8DeX/nvIRrte6ZjP2a4"
+Feature-Policy: payment 'self'
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en">
+<head>
+ <meta charset="UTF-8">
+ <title>Swagger UI</title>
+ <link rel="stylesheet" type="text/css" href="./swagger-ui.css" >
+ <link rel="icon" type="image/png" href="./favicon-32x32.png" sizes="32x32" /><link rel="icon" type="image/png" href="./favicon-16x16.png" sizes="16x16" />
+ <style>
+ html
+ {
+ box-sizing: border-box;
+ overflow: -moz-scrollbars-vertical;
+ overflow-y: scroll;
+ }
+ *,
+ *:before,
+ *:after
+ {
+ box-sizing: inherit;
+ }
+ body {
+ margin:0;
+ background: #fafafa;
+ }
+ </style>
+</head>
+<body>
+<svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" style="position:absolute;width:0;height:0">
+ <defs>
+ <symbol viewBox="0 0 20 20" id="unlocked">
+ <path d="M15.8 8H14V5.6C14 2.703 12.665 1 10 1 7.334 1 6 2.703 6 5.6V6h2v-.801C8 3.754 8.797 3 10 3c1.203 0 2 .754 2 2.199V8H4c-.553 0-1 .646-1 1.199V17c0 .549.428 1.139.951 1.307l1.197.387C5.672 18.861 6.55 19 7.1 19h5.8c.549 0 1.428-.139 1.951-.307l1.196-.387c.524-.167.953-.757.953-1.306V9.199C17 8.646 16.352 8 15.8 8z"></path>
+ </symbol>
+ <symbol viewBox="0 0 20 20" id="locked">
+ <path d="M15.8 8H14V5.6C14 2.703 12.665 1 10 1 7.334 1 6 2.703 6 5.6V8H4c-.553 0-1 .646-1 1.199V17c0 .549.428 1.139.951 1.307l1.197.387C5.672 18.861 6.55 19 7.1 19h5.8c.549 0 1.428-.139 1.951-.307l1.196-.387c.524-.167.953-.757.953-1.306V9.199C17 8.646 16.352 8 15.8 8zM12 8H8V5.199C8 3.754 8.797 3 10 3c1.203 0 2 .754 2 2.199V8z"/></path>
+ </symbol>
+ <symbol viewBox="0 0 20 20" id="close">
+ <path d="M14.348 14.849c-.469.469-1.229.469-1.697 0L10 11.819l-2.651 3.029c-.469.469-1.229.469-1.697 0-.469-.469-.469-1.229 0-1.697l2.758-3.15-2.759-3.152c-.469-.469-.469-1.228 0-1.697.469-.469 1.228-.469 1.697 0L10 8.183l2.651-3.031c.469-.469 1.228-.469 1.697 0 .469.469.469 1.229 0 1.697l-2.758 3.152 2.758 3.15c.469.469.469 1.229 0 1.698z"/></path>
+ </symbol>
+ <symbol viewBox="0 0 20 20" id="large-arrow">
+ <path d="M13.25 10L6.109 2.58c-.268-.27-.268-.707 0-.979.268-.27.701-.27.969 0l7.83 7.908c.268.271.268.709 0 .979l-7.83 7.908c-.268.271-.701.27-.969 0-.268-.269-.268-.707 0-.979L13.25 10z"/></path>
+ </symbol>
+ <symbol viewBox="0 0 20 20" id="large-arrow-down">
+ <path d="M17.418 6.109c.272-.268.709-.268.979 0s.271.701 0 .969l-7.908 7.83c-.27.268-.707.268-.979 0l-7.908-7.83c-.27-.268-.27-.701 0-.969.271-.268.709-.268.979 0L10 13.25l7.418-7.141z"/></path>
+ </symbol>
+ <symbol viewBox="0 0 24 24" id="jump-to">
+ <path d="M19 7v4H5.83l3.58-3.59L8 6l-6 6 6 6 1.41-1.41L5.83 13H21V7z"/></path>
+ </symbol>
+ <symbol viewBox="0 0 24 24" id="expand">
+ <path d="M10 18h4v-2h-4v2zM3 6v2h18V6H3zm3 7h12v-2H6v2z"/></path>
+ </symbol>
+ </defs>
+</svg>
+<div id="swagger-ui"></div>
+<script src="./swagger-ui-bundle.js"> </script>
+<script src="./swagger-ui-standalone-preset.js"> </script>
+<script src="./swagger-ui-init.js"> </script>
+<style>
+ .swagger-ui .topbar .…</style></body></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: text/html, application/json' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:124.0) Gecko/20100101 Firefox/124.0' 'http://localhost:3000/api-docs/swagger.json'
+ + + + + + + +https://swagger.io/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Wildcard DNS Configuration - Detection' on '3aj8dspzseo2emtc2fiziwpahrm-3aj8dspzseo2emtc2fiziwpahrm.localhost' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +A wildcard DNS configuration was detected. Wildcard DNS records can resolve all subdomains to the same IP address, which may indicate a catch-all configuration.
+Results:
+127.0.0.1
;; opcode: QUERY, status: NOERROR, id: 33800 +;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 + +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 + +;; QUESTION SECTION: +;3AJ8DsPzSEo2eMTc2FIzIWpAHrm-3AJ8DsPzSEo2eMTc2FIzIWpAHrm.localhost. IN A ++ +
;; opcode: QUERY, status: NOERROR, id: 33800 +;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 +;; OPT PSEUDOSECTION: +; EDNS: version 0; flags:; udp: 4096 +;; QUESTION SECTION: +;3AJ8DsPzSEo2eMTc2FIzIWpAHrm-3AJ8DsPzSEo2eMTc2FIzIWpAHrm.localhost. IN A +;; ANSWER SECTION: +3AJ8DsPzSEo2eMTc2FIzIWpAHrm-3AJ8DsPzSEo2eMTc2FIzIWpAHrm.localhost. 10800 IN A 127.0.0.1 ++ + + + + + + + + + + +
+ + + + + + + +https://en.wikipedia.org/wiki/Wildcard_DNS_record
+https://developers.cloudflare.com/dns/manage-dns-records/reference/wildcard-dns-records/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 1.67% + / + 81.83% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\1\1|t1|\\2537)+' in grep.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2018-20796
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2018-20796
+Related Vulnerability URLs:
+- http://www.securityfocus.com/bid/107160
+- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34141
+- https://lists.gnu.org/archive/html/bug-gnulib/2019-01/msg00108.html
+- https://security.netapp.com/advisory/ntap-20190315-0002/
+- https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.86% + / + 74.63% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2019-1010025
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-1010025
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=22853
+- https://support.f5.com/csp/article/K06046097
+- https://support.f5.com/csp/article/K06046097?utm_source=f5support&%3Butm_medium=RSS
+- https://ubuntu.com/security/CVE-2019-1010025
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.84% + / + 74.39% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\1\1)' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern
+Matcher: dpkg-matcher
+Package URL:* pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2019-9192
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-9192
+Related Vulnerability URLs:
+- https://sourceware.org/bugzilla/show_bug.cgi?id=24269
+- https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.05% + / + 15.86% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libssl3 | + + +3.0.17-1~deb12u2 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libssl3 | +
+ + +CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libssl3@3.0.17-1~deb12u2?arch=amd64&distro=debian-12&upstream=openssl
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2025-27587
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2025-27587
+Related Vulnerability URLs:
+- https://github.com/openssl/openssl/issues/24253
+- https://minerva.crocs.fi.muni.cz
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.05% + / + 15.44% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| gcc-12-base | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/gcc-12-base | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/gcc-12-base@12.2.0-14%2Bdeb12u1?arch=amd64&distro=debian-12&upstream=gcc-12
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2022-27943
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+Related Vulnerability URLs:
+- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.05% + / + 15.44% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libgcc-s1 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libgcc-s1 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libgcc-s1@12.2.0-14%2Bdeb12u1?arch=amd64&distro=debian-12&upstream=gcc-12
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2022-27943
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+Related Vulnerability URLs:
+- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.05% + / + 15.44% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libgomp1 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libgomp1 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libgomp1@12.2.0-14%2Bdeb12u1?arch=amd64&distro=debian-12&upstream=gcc-12
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2022-27943
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+Related Vulnerability URLs:
+- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.05% + / + 15.44% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libstdc++6 | + + +12.2.0-14+deb12u1 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libstdc++6 | +
+ + +CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: libiberty/rust-demangle.c in GNU GCC 11.2 allows stack consumption in demangle_const, as demonstrated by nm-new.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libstdc%2B%2B6@12.2.0-14%2Bdeb12u1?arch=amd64&distro=debian-12&upstream=gcc-12
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2022-27943
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2022-27943
+Related Vulnerability URLs:
+- https://gcc.gnu.org/bugzilla/show_bug.cgi?id=105039
+- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
+- https://sourceware.org/bugzilla/show_bug.cgi?id=28995
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.39% + / + 59.82% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2010-4756
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2010-4756
+Related Vulnerability URLs:
+- http://cxib.net/stuff/glob-0day.c
+- http://securityreason.com/achievement_securityalert/89
+- http://securityreason.com/exploitalert/9223
+- https://bugzilla.redhat.com/show_bug.cgi?id=681681
+- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-4756
+- https://security.netapp.com/advisory/ntap-20241108-0002/
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Modern Web Application' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Modern Web Application' on 'http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Modern Web Application' on 'http://localhost:3000/juice-shop/node_modules/express/lib/router/layer.js:95:5' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Modern Web Application' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The application appears to be a modern web application. If you need to explore
+it automatically then the Ajax Spider may well be more effective than the
+standard one.
+ + + +This is an informational alert and so no changes are required.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>+ + + + + + + + + + + +
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 524 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Non-Storable Content' on 'http://localhost:3000/ftp/coupons_2013.md.bak' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The response contents are not storable by caching components such as proxy
+servers. If the response does not contain sensitive, personal or user-specific
+information, it may benefit from being stored and cached, to improve
+performance.
+ + + +The content may be marked as storable by ensuring that the following
+
+conditions are satisfied:The request method must be understood by the cache and defined as being
+
+cacheable ("GET", "HEAD", and "POST" are currently defined as cacheable)The response status code must be understood by the cache (one of the 1XX, 2XX,
+
+3XX, 4XX, or 5XX response classes are generally understood)The "no-store" cache directive must not appear in the request or response
+
+header fieldsFor caching by "shared" caches such as "proxy" caches, the "private" response
+
+directive must not appear in the responseFor caching by "shared" caches such as "proxy" caches, the "Authorization"
+
+header field must not appear in the request, unless the response explicitly
+allows it (using one of the "must-revalidate", "public", or "s-maxage" Cache-
+Control response directives)In addition to the conditions above, at least one of the following conditions
+
+must also be satisfied by the response:It must contain an "Expires" header field
+It must contain a "max-age" response directive
+For "shared" caches such as "proxy" caches, it must contain a "s-maxage"
+
+response directiveIt must contain a "Cache Control Extension" that allows it to be cached
+It must have a status code that is defined as cacheable by default (200, 203,
+204, 206, 300, 301, 404, 405, 410, 414, 501).
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
403+ + + + + + + + + + + +
+ + + + + + + +https://datatracker.ietf.org/doc/html/rfc7234
+https://datatracker.ietf.org/doc/html/rfc7231
+https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 524 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Storable and Cacheable Content' on 'http://localhost:3000/ftp' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Storable and Cacheable Content' on 'http://localhost:3000/robots.txt' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The response contents are storable by caching components such as proxy
+servers, and may be retrieved directly from the cache, rather than from the
+origin server by the caching servers, in response to similar requests from
+other users. If the response data is sensitive, personal or user-specific,
+this may result in sensitive information being leaked. In some cases, this may
+even result in a user gaining complete control of the session of another user,
+depending on the configuration of the caching components in use in their
+environment. This is primarily an issue where "shared" caching servers such as
+"proxy" caches are configured on the local network. This configuration is
+typically found in corporate or educational environments, for instance.
+ + + +Validate that the response does not contain sensitive, personal or user-
+
+specific information. If it does, consider the use of the following HTTP
+response headers, to limit, or prevent the content being stored and retrieved
+from the cache by another user:Cache-Control: no-cache, no-store, must-revalidate, private
+Pragma: no-cache
+Expires: 0
+This configuration directs both HTTP 1.0 and HTTP 1.1 compliant caching
+servers to not store the response, and to not retrieve the response (without
+validation) from the cache, in response to a similar request.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ + + + + + + + + + + +
+ + + + + + + +https://datatracker.ietf.org/doc/html/rfc7234
+https://datatracker.ietf.org/doc/html/rfc7231
+https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + ++ + 524 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Storable but Non-Cacheable Content' on 'http://localhost:3000' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Storable but Non-Cacheable Content' on 'http://localhost:3000/assets/public/favicon_js.ico' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Storable but Non-Cacheable Content' on 'http://localhost:3000/runtime.js' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Storable but Non-Cacheable Content' on 'http://localhost:3000/sitemap.xml' | +Active | +March 20, 2026 | +March 20, 2026 | + +
| 'Storable but Non-Cacheable Content' on 'http://localhost:3000/styles.css' | +Active | +March 20, 2026 | +March 20, 2026 | + +
+ + +The response contents are storable by caching components such as proxy
+servers, but will not be retrieved directly from the cache, without validating
+the request upstream, in response to similar requests from other users.
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
max-age=0+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
max-age=0+ + +
Method: GET +Param: +Attack: +EndpointQuery: +EndpointFragment:+ +
max-age=0+ + + + + + + + + + + +
+ + + + + + + +https://datatracker.ietf.org/doc/html/rfc7234
+https://datatracker.ietf.org/doc/html/rfc7231
+https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ 0.32% + / + 54.83% + | +Active | + +March 20, 2026 | +0 days | +Admin User (admin) | + + + +
| Component | + + +Version | + + +
|---|---|
| libc6 | + + +2.36-9+deb12u10 | + + +
| File Path | +
|---|
| /var/lib/dpkg/status.d/libc6 | +
+ + +CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
+ + + + + + + + + + + + +Vulnerability Namespace: debian:distro:debian:12
+Vulnerability Description: GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.
+Matcher: dpkg-matcher
+Package URL: pkg:deb/debian/libc6@2.36-9%2Bdeb12u10?arch=amd64&distro=debian-12&upstream=glibc
+ + + + + + + +Vulnerability Datasource: https://security-tracker.debian.org/tracker/CVE-2019-1010023
+Related Vulnerability Datasource: https://nvd.nist.gov/vuln/detail/CVE-2019-1010023
+Related Vulnerability URLs:
+- http://www.securityfocus.com/bid/109167
+- https://sourceware.org/bugzilla/show_bug.cgi?id=22851
+- https://support.f5.com/csp/article/K11932200?utm_source=f5support&%3Butm_medium=RSS
+- https://ubuntu.com/security/CVE-2019-1010023
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'robots.txt File' on 'http://localhost:3000/robots.txt' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
None+ + + + +
GET /robots.txt HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK +Connection: close +Content-Length: 28 +Access-Control-Allow-Origin: * +Content-Type: text/plain; charset=utf-8 +Date: Sat, 28 Feb 2026 17:21:26 GMT +Etag: W/"1c-8HgF6mNyhsSFK0pascC9uB0wjX0" +Feature-Policy: payment 'self' +Vary: Accept-Encoding +X-Content-Type-Options: nosniff +X-Frame-Options: SAMEORIGIN +X-Recruiting: /#/jobs +User-agent: * +Disallow: /ftp+ + + + + + + +
+ + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Fedora; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/136.0.0.0 Safari/537.36' 'http://localhost:3000/robots.txt'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'X-Recruiting Header' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Websites that advertise jobs via HTTP headers
+Results:
+/#/jobs
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:26 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.0.0 Safari/537.36' 'http://localhost:3000'
+ + + + + + + +https://webtechsurvey.com/response-header/x-recruiting
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'robots.txt Endpoint Prober' on 'http://localhost:3000/robots.txt' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Results:
+/ftp
GET /robots.txt HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK +Connection: close +Content-Length: 28 +Access-Control-Allow-Origin: * +Content-Type: text/plain; charset=utf-8 +Date: Sat, 28 Feb 2026 17:21:33 GMT +Etag: W/"1c-8HgF6mNyhsSFK0pascC9uB0wjX0" +Feature-Policy: payment 'self' +Vary: Accept-Encoding +X-Content-Type-Options: nosniff +X-Frame-Options: SAMEORIGIN +X-Recruiting: /#/jobs +User-agent: * +Disallow: /ftp+ + + + + + + +
+ + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.127 Safari/537.36' 'http://localhost:3000/robots.txt'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'Missing Subresource Integrity' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +Checks if external script and stylesheet tags in the HTML response are missing the Subresource Integrity (SRI) attribute.
+Results:
+//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js
+//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js
+//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.18362 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:33 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.18362' 'http://localhost:3000/'
+ + + + + + + +https://cheatsheetseries.owasp.org/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html#subresource-integrity
+https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + +CWE | + + +
|---|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + ++ + 200 + + | + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'FingerprintHub Technology Fingerprint' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +FingerprintHub Technology Fingerprint tests run in nuclei.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:135.0) Gecko/20100101 Firefox/135.0 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:33 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:135.0) Gecko/20100101 Firefox/135.0' 'http://localhost:3000'
+ + + + + + + +https://github.com/0x727/FingerprintHub
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
| Severity | +EPSS Score / Percentile | +Status | + +Date discovered | +Age | +Reporter | + + + +
|---|---|---|---|---|---|
| + + + Info + + + | ++ N.A. + / + N.A. + | +Active | + +Feb. 28, 2026 | +20 days | +Admin User (admin) | + + + +
| Endpoint | +Status | +Date Discovered | +Last Modified | +
|---|---|---|---|
| 'HTTP Missing Security Headers' on 'http://localhost:3000' | +Active | +Feb. 28, 2026 | +March 20, 2026 | + +
+ + + + +This template searches for missing HTTP security headers. The impact of these missing headers can vary.
GET / HTTP/1.1 +Host: localhost:3000 +User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13 +Connection: close +Accept: */* +Accept-Language: en +Accept-Encoding: gzip + ++ +
HTTP/1.1 200 OK
+Connection: close
+Transfer-Encoding: chunked
+Accept-Ranges: bytes
+Access-Control-Allow-Origin: *
+Cache-Control: public, max-age=0
+Content-Type: text/html; charset=UTF-8
+Date: Sat, 28 Feb 2026 17:21:45 GMT
+Etag: W/"124fa-19ca4d8d8e4"
+Feature-Policy: payment 'self'
+Last-Modified: Sat, 28 Feb 2026 15:23:20 GMT
+Vary: Accept-Encoding
+X-Content-Type-Options: nosniff
+X-Frame-Options: SAMEORIGIN
+X-Recruiting: /#/jobs
+
+
+<html lang="en" data-beasties-container>
+<head>
+ <meta charset="utf-8">
+ <title>OWASP Juice Shop</title>
+ <meta name="description" content="Probably the most modern and sophisticated insecure web application">
+ <meta name="viewport" content="width=device-width, initial-scale=1">
+ <link id="favicon" rel="icon" type="image/x-icon" href="assets/public/favicon_js.ico">
+ <link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.css">
+ <script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script>
+ <script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script>
+ <script>
+ window.addEventListener("load", function(){
+ window.cookieconsent.initialise({
+ "palette": {
+ "popup": { "background": "var(--theme-primary)", "text": "var(--theme-text)" },
+ "button": { "background": "var(--theme-accent)", "text": "var(--theme-text)" }
+ },
+ "…</script></head></html>
+
+
+
+
+
+
+
+ + + + + + + + + + + +curl command to reproduce the request:
+curl -X 'GET' -d '' -H 'Accept: */*' -H 'Accept-Language: en' -H 'User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_5_2; es-es) AppleWebKit/525.13 (KHTML, like Gecko) Version/3.1 Safari/525.13' 'http://localhost:3000'
Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
", + "otherinfo": "", + "reference": "", + "cweid": "829", + "wascid": "15", + "sourceid": "9" + }, + { + "pluginid": "2", + "alertRef": "2", + "alert": "Private IP Disclosure", + "name": "Private IP Disclosure", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "A private IP (such as 10.x.x.x, 172.x.x.x, 192.168.x.x) or an Amazon EC2 private hostname (for example, ip-10-0-56-78) has been found in the HTTP response body. This information might be helpful for further attacks targeting internal systems.
", + "instances":[ + { + "id": "196", + "uri": "http://localhost:3000/rest/admin/application-configuration", + "nodeName": "http:\/\/localhost:3000\/rest\/admin\/application-configuration", + "method": "GET", + "param": "", + "attack": "", + "evidence": "192.168.99.100:3000", + "otherinfo": "192.168.99.100:3000\n192.168.99.100:4200\n" + } + ], + "count": "1", + "systemic": false, + "solution": "Remove the private IP address from the HTTP response body. For comments, use JSP/ASP/PHP comment instead of HTML/JavaScript comment which can be seen by client browsers.
", + "otherinfo": "192.168.99.100:3000
192.168.99.100:4200
", + "reference": "https://datatracker.ietf.org/doc/html/rfc1918
", + "cweid": "497", + "wascid": "13", + "sourceid": "109" + }, + { + "pluginid": "10096", + "alertRef": "10096", + "alert": "Timestamp Disclosure - Unix", + "name": "Timestamp Disclosure - Unix", + "riskcode": "1", + "confidence": "1", + "riskdesc": "Low (Low)", + "desc": "A timestamp was disclosed by the application/web server. - Unix
", + "instances":[ + { + "id": "18", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1650485437", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37." + }, + { + "id": "22", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "2038834951", + "otherinfo": "2038834951, which evaluates to: 2034-08-10 15:02:31." + }, + { + "id": "20", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1650485437", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37." + }, + { + "id": "25", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1981395349", + "otherinfo": "1981395349, which evaluates to: 2032-10-14 19:35:49." + }, + { + "id": "23", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "2038834951", + "otherinfo": "2038834951, which evaluates to: 2034-08-10 15:02:31." + } + ], + "count": "5", + "systemic": true, + "solution": "Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.
", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37.
", + "reference": "https://cwe.mitre.org/data/definitions/200.html
", + "cweid": "497", + "wascid": "13", + "sourceid": "4" + }, + { + "pluginid": "10021", + "alertRef": "10021", + "alert": "X-Content-Type-Options Header Missing", + "name": "X-Content-Type-Options Header Missing", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "The Anti-MIME-Sniffing header X-Content-Type-Options was not set to 'nosniff'. This allows older versions of Internet Explorer and Chrome to perform MIME-sniffing on the response body, potentially causing the response body to be interpreted and displayed as a content type other than the declared content type. Current (early 2014) and legacy versions of Firefox will use the declared content type (if one is set), rather than performing MIME-sniffing.
", + "instances":[ + { + "id": "173", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9cjF&sid=-52d_NrQKHFSql3iAAAA", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,t,transport)", + "method": "GET", + "param": "x-content-type-options", + "attack": "", + "evidence": "", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.\nAt \"High\" threshold this scan rule will not alert on client or server error responses." + }, + { + "id": "174", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9cbL", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,t,transport)", + "method": "GET", + "param": "x-content-type-options", + "attack": "", + "evidence": "", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.\nAt \"High\" threshold this scan rule will not alert on client or server error responses." + }, + { + "id": "178", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9cjB&sid=-52d_NrQKHFSql3iAAAA", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,t,transport)(40)", + "method": "POST", + "param": "x-content-type-options", + "attack": "", + "evidence": "", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.\nAt \"High\" threshold this scan rule will not alert on client or server error responses." + }, + { + "id": "195", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9clg&sid=-52d_NrQKHFSql3iAAAA", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,t,transport)(42[\"notification received\",\"9c297196ecf8...)", + "method": "POST", + "param": "x-content-type-options", + "attack": "", + "evidence": "", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.\nAt \"High\" threshold this scan rule will not alert on client or server error responses." + }, + { + "id": "220", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9cpC&sid=-52d_NrQKHFSql3iAAAA", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,t,transport)(42[\"notification received\",\"ff4aebffe31b...)", + "method": "POST", + "param": "x-content-type-options", + "attack": "", + "evidence": "", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.\nAt \"High\" threshold this scan rule will not alert on client or server error responses." + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that the application/web server sets the Content-Type header appropriately, and that it sets the X-Content-Type-Options header to 'nosniff' for all web pages.
If possible, ensure that the end user uses a standards-compliant and modern web browser that does not perform MIME-sniffing at all, or that can be directed by the web application/web server to not perform MIME-sniffing.
", + "otherinfo": "This issue still applies to error type pages (401, 403, 500, etc.) as those pages are often still affected by injection issues, in which case there is still concern for browsers sniffing pages away from their actual content type.
At \"High\" threshold this scan rule will not alert on client or server error responses.
", + "reference": "https://learn.microsoft.com/en-us/previous-versions/windows/internet-explorer/ie-developer/compatibility/gg622941(v=vs.85)
https://owasp.org/www-community/Security_Headers
", + "cweid": "693", + "wascid": "15", + "sourceid": "117" + }, + { + "pluginid": "10111", + "alertRef": "10111", + "alert": "Authentication Request Identified", + "name": "Authentication Request Identified", + "riskcode": "0", + "confidence": "3", + "riskdesc": "Informational (High)", + "desc": "The given request has been identified as an authentication request. The 'Other Info' field contains a set of key=value lines which identify any relevant fields. If the request is in a context which has an Authentication Method set to \"Auto-Detect\" then this rule will change the authentication to match the request identified.
", + "instances":[ + { + "id": "0", + "uri": "http://localhost:3000/rest/user/login", + "nodeName": "http:\/\/localhost:3000\/rest\/user\/login ()({email,password})", + "method": "POST", + "param": "email", + "attack": "", + "evidence": "password", + "otherinfo": "userParam=email\nuserValue=admin@juice-sh.op\npasswordParam=password" + } + ], + "count": "1", + "systemic": false, + "solution": "This is an informational alert rather than a vulnerability and so there is nothing to fix.
", + "otherinfo": "userParam=email
userValue=admin@juice-sh.op
passwordParam=password
", + "reference": "https://www.zaproxy.org/docs/desktop/addons/authentication-helper/auth-req-id/
", + "cweid": "-1", + "wascid": "-1", + "sourceid": "13" + }, + { + "pluginid": "10027", + "alertRef": "10027", + "alert": "Information Disclosure - Suspicious Comments", + "name": "Information Disclosure - Suspicious Comments", + "riskcode": "0", + "confidence": "1", + "riskdesc": "Informational (Low)", + "desc": "The response appears to contain suspicious comments which may help an attacker.
", + "instances":[ + { + "id": "164", + "uri": "http://localhost:3000/main.js", + "nodeName": "http:\/\/localhost:3000\/main.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "query", + "otherinfo": "The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//owasp.org' target='_blank'>Open Worldwide Application Security Project (OWASP) and is developed and maintained by voluntee\", see evidence field for the suspicious comment/snippet." + }, + { + "id": "361", + "uri": "http://localhost:3000/tutorial.js", + "nodeName": "http:\/\/localhost:3000\/tutorial.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "query", + "otherinfo": "The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/771984076&color=%23ff5500&auto_play=true&h\", see evidence field for the suspicious comment/snippet." + }, + { + "id": "221", + "uri": "http://localhost:3000/vendor.js", + "nodeName": "http:\/\/localhost:3000\/vendor.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Query", + "otherinfo": "The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//www.w3.org/2000/svg\" viewBox=\"0 0 512 512\">The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//owasp.org' target='_blank'>Open Worldwide Application Security Project (OWASP) and is developed and maintained by voluntee\", see evidence field for the suspicious comment/snippet.
", + "reference": "", + "cweid": "615", + "wascid": "13", + "sourceid": "84" + }, + { + "pluginid": "10109", + "alertRef": "10109", + "alert": "Modern Web Application", + "name": "Modern Web Application", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.
", + "instances":[ + { + "id": "16", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "52", + "uri": "http://localhost:3000/", + "nodeName": "http:\/\/localhost:3000\/", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "75", + "uri": "http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/fileServer.js:59:18", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "80", + "uri": "http://localhost:3000/juice-shop/node_modules/express/lib/router/index.js:376:14", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/node_modules\/express\/lib\/router\/index.js:376:14", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "15", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + } + ], + "count": "5", + "systemic": true, + "solution": "This is an informational alert and so no changes are required.
", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application.
", + "reference": "", + "cweid": "-1", + "wascid": "-1", + "sourceid": "9" + }, + { + "pluginid": "10112", + "alertRef": "10112", + "alert": "Session Management Response Identified", + "name": "Session Management Response Identified", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The given response has been identified as containing a session management token. The 'Other Info' field contains a set of header tokens that can be used in the Header Based Session Management Method. If the request is in a context which has a Session Management Method set to \"Auto-Detect\" then this rule will change the session management to use the tokens identified.
", + "instances":[ + { + "id": "1", + "uri": "http://localhost:3000/rest/user/login", + "nodeName": "http:\/\/localhost:3000\/rest\/user\/login ()({email,password})", + "method": "POST", + "param": "authentication.token", + "attack": "", + "evidence": "authentication.token", + "otherinfo": "json:authentication.token" + }, + { + "id": "213", + "uri": "http://localhost:3000/rest/continue-code", + "nodeName": "http:\/\/localhost:3000\/rest\/continue-code", + "method": "GET", + "param": "continueCode", + "attack": "", + "evidence": "continueCode", + "otherinfo": "json:continueCode" + } + ], + "count": "2", + "systemic": false, + "solution": "This is an informational alert rather than a vulnerability and so there is nothing to fix.
", + "otherinfo": "json:authentication.token
", + "reference": "https://www.zaproxy.org/docs/desktop/addons/authentication-helper/session-mgmt-id/
", + "cweid": "-1", + "wascid": "-1", + "sourceid": "13" + }, + { + "pluginid": "10104", + "alertRef": "10104", + "alert": "User Agent Fuzzer", + "name": "User Agent Fuzzer", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "Check for differences in response based on fuzzed User Agent (eg. mobile sites, access as a Search Engine Crawler). Compares the response statuscode and the hashcode of the response body with the original response.
", + "instances":[ + { + "id": "1200", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9ljw&sid=_vpYtaGKbLblFcfkAAAo", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,t,transport)", + "method": "GET", + "param": "Header User-Agent", + "attack": "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)", + "evidence": "", + "otherinfo": "" + }, + { + "id": "1199", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=websocket&sid=_vpYtaGKbLblFcfkAAAo", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,sid,transport)", + "method": "GET", + "param": "Header User-Agent", + "attack": "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)", + "evidence": "", + "otherinfo": "" + }, + { + "id": "1198", + "uri": "http://localhost:3000/socket.io/?EIO=4&transport=polling&t=PpB9lWp", + "nodeName": "http:\/\/localhost:3000\/socket.io\/ (EIO,t,transport)", + "method": "GET", + "param": "Header User-Agent", + "attack": "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1)", + "evidence": "", + "otherinfo": "" + } + ], + "count": "3", + "systemic": true, + "solution": "", + "otherinfo": "", + "reference": "https://owasp.org/wstg
", + "cweid": "0", + "wascid": "0", + "sourceid": "1471" + } + ] + } + ], + "sequences":[ + ] + +} diff --git a/labs/lab5/zap/zap-report-new.html b/labs/lab5/zap/zap-report-new.html new file mode 100644 index 00000000..b4eda142 --- /dev/null +++ b/labs/lab5/zap/zap-report-new.html @@ -0,0 +1,3277 @@ + + + + +| Risk Level | +Number of Alerts | +
|---|---|
|
+ High
+ |
+
+ 0
+ |
+
|
+ Medium
+ |
+
+ 2
+ |
+
|
+ Low
+ |
+
+ 6
+ |
+
|
+ Informational
+ |
+
+ 4
+ |
+
|
+ False Positives:
+ |
+
+ 0
+ |
+
| Level | +Reason | +Site | +Description | +Statistic | +
|---|---|---|---|---|
|
+ Low
+ |
+
+ Warning
+ |
+ + + | +
+ ZAP warnings logged - see the zap.log file for details
+ |
+
+ 7
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of responses with status code 2xx
+ |
+
+ 91 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of responses with status code 4xx
+ |
+
+ 8 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type application/javascript
+ |
+
+ 5 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type application/octet-stream
+ |
+
+ 6 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type image/x-icon
+ |
+
+ 1 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type text/css
+ |
+
+ 1 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type text/html
+ |
+
+ 79 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type text/markdown
+ |
+
+ 4 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with content type text/plain
+ |
+
+ 1 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of endpoints with method GET
+ |
+
+ 100 %
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Count of total endpoints
+ |
+
+ 72
+ |
+
|
+ Info
+ |
+
+ Informational
+ |
+
+ http://localhost:3000
+ |
+
+ Percentage of slow responses
+ |
+
+ 60 %
+ |
+
For each step: result (Pass/Fail) - risk (of highest alert(s) for the step, if any).
+ + + + + + + + +| Name | +Risk Level | +Number of Instances | +
|---|---|---|
| Content Security Policy (CSP) Header Not Set | +Medium | + +Systemic | + + +
| Cross-Domain Misconfiguration | +Medium | + +Systemic | + + +
| Cross-Domain JavaScript Source File Inclusion | +Low | + +Systemic | + + +
| Cross-Origin-Embedder-Policy Header Missing or Invalid | +Low | + + +5 | + +
| Cross-Origin-Opener-Policy Header Missing or Invalid | +Low | + + +5 | + +
| Dangerous JS Functions | +Low | + + +2 | + +
| Deprecated Feature Policy Header Set | +Low | + +Systemic | + + +
| Timestamp Disclosure - Unix | +Low | + +Systemic | + + +
| Modern Web Application | +Informational | + +Systemic | + + +
| Non-Storable Content | +Informational | + + +1 | + +
| Storable and Cacheable Content | +Informational | + + +2 | + +
| Storable but Non-Cacheable Content | +Informational | + +Systemic | + + +
|
+ Medium |
+ Content Security Policy (CSP) Header Not Set | +
|---|---|
| Description | +
+ Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ | +
| Node Name | +http://localhost:3000/ | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ftp | +
| Node Name | +http://localhost:3000/ftp | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ftp/coupons_2013.md.bak | +
| Node Name | +http://localhost:3000/ftp/coupons_2013.md.bak | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| Instances | + +Systemic | + + +
| Solution | +
+ Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header.
+
+ |
+
| Reference | +
+ https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP
+ + + https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html + + + https://www.w3.org/TR/CSP/ + + + https://w3c.github.io/webappsec-csp/ + + + https://web.dev/articles/csp + + + https://caniuse.com/#feat=contentsecuritypolicy + + + https://content-security-policy.com/ + + |
+
| CWE Id | +693 | +
| WASC Id | +15 | +
| Plugin Id | +10038 | +
|
+ Medium |
+ Cross-Domain Misconfiguration | +
|---|---|
| Description | +
+ Web browser data loading may be possible, due to a Cross Origin Resource Sharing (CORS) misconfiguration on the web server.
+
+ |
+
| + | |
| URL | +http://localhost:3000/assets/public/favicon_js.ico | +
| Node Name | +http://localhost:3000/assets/public/favicon_js.ico | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Access-Control-Allow-Origin: * | +
| Other Info | +
+ The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
+
+ |
+
| URL | +http://localhost:3000/polyfills.js | +
| Node Name | +http://localhost:3000/polyfills.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Access-Control-Allow-Origin: * | +
| Other Info | +
+ The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
+
+ |
+
| URL | +http://localhost:3000/robots.txt | +
| Node Name | +http://localhost:3000/robots.txt | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Access-Control-Allow-Origin: * | +
| Other Info | +
+ The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
+
+ |
+
| URL | +http://localhost:3000/runtime.js | +
| Node Name | +http://localhost:3000/runtime.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Access-Control-Allow-Origin: * | +
| Other Info | +
+ The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
+
+ |
+
| URL | +http://localhost:3000/styles.css | +
| Node Name | +http://localhost:3000/styles.css | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Access-Control-Allow-Origin: * | +
| Other Info | +
+ The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
+
+ |
+
| Instances | + +Systemic | + + +
| Solution | +
+ Ensure that sensitive data is not available in an unauthenticated manner (using IP address white-listing, for instance).
+ + + Configure the "Access-Control-Allow-Origin" HTTP header to a more restrictive set of domains, or remove all CORS headers entirely, to allow the web browser to enforce the Same Origin Policy (SOP) in a more restrictive manner.
+
+ |
+
| Reference | ++ https://vulncat.fortify.com/en/detail?category=HTML5&subcategory=Overly%20Permissive%20CORS%20Policy + + | +
| CWE Id | +264 | +
| WASC Id | +14 | +
| Plugin Id | +10098 | +
|
+ Low |
+ Cross-Domain JavaScript Source File Inclusion | +
|---|---|
| Description | +
+ The page includes one or more script files from a third-party domain.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | +//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js | +
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | ++ |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | +//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | +
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> | +
| Other Info | ++ |
| URL | +http://localhost:3000/ | +
| Node Name | +http://localhost:3000/ | +
| Method | +GET | +
| Parameter | +//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js | +
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | +//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js | +
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | +//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js | +
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js"></script> | +
| Other Info | ++ |
| Instances | + +Systemic | + + +
| Solution | +
+ Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
+
+ |
+
| Reference | ++ |
| CWE Id | +829 | +
| WASC Id | +15 | +
| Plugin Id | +10017 | +
|
+ Low |
+ Cross-Origin-Embedder-Policy Header Missing or Invalid | +
|---|---|
| Description | +
+ Cross-Origin-Embedder-Policy header is a response header that prevents a document from loading any cross-origin resources that don't explicitly grant the document permission (using CORP or CORS).
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | +Cross-Origin-Embedder-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ | +
| Node Name | +http://localhost:3000/ | +
| Method | +GET | +
| Parameter | +Cross-Origin-Embedder-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ftp | +
| Node Name | +http://localhost:3000/ftp | +
| Method | +GET | +
| Parameter | +Cross-Origin-Embedder-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Node Name | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Method | +GET | +
| Parameter | +Cross-Origin-Embedder-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | +Cross-Origin-Embedder-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| Instances | + + +5 | + +
| Solution | +
+ Ensure that the application/web server sets the Cross-Origin-Embedder-Policy header appropriately, and that it sets the Cross-Origin-Embedder-Policy header to 'require-corp' for documents.
+ + + If possible, ensure that the end user uses a standards-compliant and modern web browser that supports the Cross-Origin-Embedder-Policy header (https://caniuse.com/mdn-http_headers_cross-origin-embedder-policy).
+
+ |
+
| Reference | ++ https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-Origin-Embedder-Policy + + | +
| CWE Id | +693 | +
| WASC Id | +14 | +
| Plugin Id | +90004 | +
|
+ Low |
+ Cross-Origin-Opener-Policy Header Missing or Invalid | +
|---|---|
| Description | +
+ Cross-Origin-Opener-Policy header is a response header that allows a site to control if others included documents share the same browsing context. Sharing the same browsing context with untrusted documents might lead to data leak.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | +Cross-Origin-Opener-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ | +
| Node Name | +http://localhost:3000/ | +
| Method | +GET | +
| Parameter | +Cross-Origin-Opener-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/ftp | +
| Node Name | +http://localhost:3000/ftp | +
| Method | +GET | +
| Parameter | +Cross-Origin-Opener-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Node Name | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Method | +GET | +
| Parameter | +Cross-Origin-Opener-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | +Cross-Origin-Opener-Policy | +
| Attack | ++ |
| Evidence | ++ |
| Other Info | ++ |
| Instances | + + +5 | + +
| Solution | +
+ Ensure that the application/web server sets the Cross-Origin-Opener-Policy header appropriately, and that it sets the Cross-Origin-Opener-Policy header to 'same-origin' for documents.
+ + + 'same-origin-allow-popups' is considered as less secured and should be avoided.
+ + + If possible, ensure that the end user uses a standards-compliant and modern web browser that supports the Cross-Origin-Opener-Policy header (https://caniuse.com/mdn-http_headers_cross-origin-opener-policy).
+
+ |
+
| Reference | ++ https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-Origin-Opener-Policy + + | +
| CWE Id | +693 | +
| WASC Id | +14 | +
| Plugin Id | +90004 | +
|
+ Low |
+ Dangerous JS Functions | +
|---|---|
| Description | +
+ A dangerous JS function seems to be in use that would leave the site vulnerable.
+
+ |
+
| + | |
| URL | +http://localhost:3000/main.js | +
| Node Name | +http://localhost:3000/main.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +bypassSecurityTrustHtml( | +
| Other Info | ++ |
| URL | +http://localhost:3000/vendor.js | +
| Node Name | +http://localhost:3000/vendor.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +bypassSecurityTrustHtml( | +
| Other Info | ++ |
| Instances | + + +2 | + +
| Solution | +
+ See the references for security advice on the use of these functions.
+
+ |
+
| Reference | ++ https://v17.angular.io/guide/security + + | +
| CWE Id | +749 | +
| WASC Id | ++ |
| Plugin Id | +10110 | +
|
+ Low |
+ Deprecated Feature Policy Header Set | +
|---|---|
| Description | +
+ The header has now been renamed to Permissions-Policy.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Feature-Policy | +
| Other Info | ++ |
| URL | +http://localhost:3000/main.js | +
| Node Name | +http://localhost:3000/main.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Feature-Policy | +
| Other Info | ++ |
| URL | +http://localhost:3000/polyfills.js | +
| Node Name | +http://localhost:3000/polyfills.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Feature-Policy | +
| Other Info | ++ |
| URL | +http://localhost:3000/runtime.js | +
| Node Name | +http://localhost:3000/runtime.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Feature-Policy | +
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +Feature-Policy | +
| Other Info | ++ |
| Instances | + +Systemic | + + +
| Solution | +
+ Ensure that your web server, application server, load balancer, etc. is configured to set the Permissions-Policy header instead of the Feature-Policy header.
+
+ |
+
| Reference | +
+ https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Permissions-Policy
+ + + https://scotthelme.co.uk/goodbye-feature-policy-and-hello-permissions-policy/ + + |
+
| CWE Id | +16 | +
| WASC Id | +15 | +
| Plugin Id | +10063 | +
|
+ Low |
+ Timestamp Disclosure - Unix | +
|---|---|
| Description | +
+ A timestamp was disclosed by the application/web server. - Unix
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +1650485437 | +
| Other Info | +
+ 1650485437, which evaluates to: 2022-04-20 20:10:37.
+
+ |
+
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +1981395349 | +
| Other Info | +
+ 1981395349, which evaluates to: 2032-10-14 19:35:49.
+
+ |
+
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +2038834951 | +
| Other Info | +
+ 2038834951, which evaluates to: 2034-08-10 15:02:31.
+
+ |
+
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +1650485437 | +
| Other Info | +
+ 1650485437, which evaluates to: 2022-04-20 20:10:37.
+
+ |
+
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +2038834951 | +
| Other Info | +
+ 2038834951, which evaluates to: 2034-08-10 15:02:31.
+
+ |
+
| Instances | + +Systemic | + + +
| Solution | +
+ Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.
+
+ |
+
| Reference | ++ https://cwe.mitre.org/data/definitions/200.html + + | +
| CWE Id | +497 | +
| WASC Id | +13 | +
| Plugin Id | +10096 | +
|
+ Informational |
+ Modern Web Application | +
|---|---|
| Description | +
+ The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | +
+ No links have been found while there are scripts, which is an indication that this is a modern web application.
+
+ |
+
| URL | +http://localhost:3000/ | +
| Node Name | +http://localhost:3000/ | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | +
+ No links have been found while there are scripts, which is an indication that this is a modern web application.
+
+ |
+
| URL | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Node Name | +http://localhost:3000/juice-shop/build/routes/fileServer.js:59:18 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | +
+ No links have been found while there are scripts, which is an indication that this is a modern web application.
+
+ |
+
| URL | +http://localhost:3000/juice-shop/node_modules/express/lib/router/layer.js:95:5 | +
| Node Name | +http://localhost:3000/juice-shop/node_modules/express/lib/router/layer.js:95:5 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | +
+ No links have been found while there are scripts, which is an indication that this is a modern web application.
+
+ |
+
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +<script src="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js"></script> | +
| Other Info | +
+ No links have been found while there are scripts, which is an indication that this is a modern web application.
+
+ |
+
| Instances | + +Systemic | + + +
| Solution | +
+ This is an informational alert and so no changes are required.
+
+ |
+
| Reference | ++ |
| CWE Id | ++ |
| WASC Id | ++ |
| Plugin Id | +10109 | +
|
+ Informational |
+ Non-Storable Content | +
|---|---|
| Description | +
+ The response contents are not storable by caching components such as proxy servers. If the response does not contain sensitive, personal or user-specific information, it may benefit from being stored and cached, to improve performance.
+
+ |
+
| + | |
| URL | +http://localhost:3000/ftp/coupons_2013.md.bak | +
| Node Name | +http://localhost:3000/ftp/coupons_2013.md.bak | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +403 | +
| Other Info | ++ |
| Instances | + + +1 | + +
| Solution | +
+ The content may be marked as storable by ensuring that the following conditions are satisfied:
+ + + The request method must be understood by the cache and defined as being cacheable ("GET", "HEAD", and "POST" are currently defined as cacheable)
+ + + The response status code must be understood by the cache (one of the 1XX, 2XX, 3XX, 4XX, or 5XX response classes are generally understood)
+ + + The "no-store" cache directive must not appear in the request or response header fields
+ + + For caching by "shared" caches such as "proxy" caches, the "private" response directive must not appear in the response
+ + + For caching by "shared" caches such as "proxy" caches, the "Authorization" header field must not appear in the request, unless the response explicitly allows it (using one of the "must-revalidate", "public", or "s-maxage" Cache-Control response directives)
+ + + In addition to the conditions above, at least one of the following conditions must also be satisfied by the response:
+ + + It must contain an "Expires" header field
+ + + It must contain a "max-age" response directive
+ + + For "shared" caches such as "proxy" caches, it must contain a "s-maxage" response directive
+ + + It must contain a "Cache Control Extension" that allows it to be cached
+ + + It must have a status code that is defined as cacheable by default (200, 203, 204, 206, 300, 301, 404, 405, 410, 414, 501).
+
+ |
+
| Reference | +
+ https://datatracker.ietf.org/doc/html/rfc7234
+ + + https://datatracker.ietf.org/doc/html/rfc7231 + + + https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html + + |
+
| CWE Id | +524 | +
| WASC Id | +13 | +
| Plugin Id | +10049 | +
|
+ Informational |
+ Storable and Cacheable Content | +
|---|---|
| Description | +
+ The response contents are storable by caching components such as proxy servers, and may be retrieved directly from the cache, rather than from the origin server by the caching servers, in response to similar requests from other users. If the response data is sensitive, personal or user-specific, this may result in sensitive information being leaked. In some cases, this may even result in a user gaining complete control of the session of another user, depending on the configuration of the caching components in use in their environment. This is primarily an issue where "shared" caching servers such as "proxy" caches are configured on the local network. This configuration is typically found in corporate or educational environments, for instance.
+
+ |
+
| + | |
| URL | +http://localhost:3000/ftp | +
| Node Name | +http://localhost:3000/ftp | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | +
+ In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234.
+
+ |
+
| URL | +http://localhost:3000/robots.txt | +
| Node Name | +http://localhost:3000/robots.txt | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | ++ |
| Other Info | +
+ In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234.
+
+ |
+
| Instances | + + +2 | + +
| Solution | +
+ Validate that the response does not contain sensitive, personal or user-specific information. If it does, consider the use of the following HTTP response headers, to limit, or prevent the content being stored and retrieved from the cache by another user:
+ + + Cache-Control: no-cache, no-store, must-revalidate, private
+ + + Pragma: no-cache
+ + + Expires: 0
+ + + This configuration directs both HTTP 1.0 and HTTP 1.1 compliant caching servers to not store the response, and to not retrieve the response (without validation) from the cache, in response to a similar request.
+
+ |
+
| Reference | +
+ https://datatracker.ietf.org/doc/html/rfc7234
+ + + https://datatracker.ietf.org/doc/html/rfc7231 + + + https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html + + |
+
| CWE Id | +524 | +
| WASC Id | +13 | +
| Plugin Id | +10049 | +
|
+ Informational |
+ Storable but Non-Cacheable Content | +
|---|---|
| Description | +
+ The response contents are storable by caching components such as proxy servers, but will not be retrieved directly from the cache, without validating the request upstream, in response to similar requests from other users.
+
+ |
+
| + | |
| URL | +http://localhost:3000 | +
| Node Name | +http://localhost:3000 | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +max-age=0 | +
| Other Info | ++ |
| URL | +http://localhost:3000/assets/public/favicon_js.ico | +
| Node Name | +http://localhost:3000/assets/public/favicon_js.ico | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +max-age=0 | +
| Other Info | ++ |
| URL | +http://localhost:3000/runtime.js | +
| Node Name | +http://localhost:3000/runtime.js | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +max-age=0 | +
| Other Info | ++ |
| URL | +http://localhost:3000/sitemap.xml | +
| Node Name | +http://localhost:3000/sitemap.xml | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +max-age=0 | +
| Other Info | ++ |
| URL | +http://localhost:3000/styles.css | +
| Node Name | +http://localhost:3000/styles.css | +
| Method | +GET | +
| Parameter | ++ |
| Attack | ++ |
| Evidence | +max-age=0 | +
| Other Info | ++ |
| Instances | + +Systemic | + + +
| Solution | ++ |
| Reference | +
+ https://datatracker.ietf.org/doc/html/rfc7234
+ + + https://datatracker.ietf.org/doc/html/rfc7231 + + + https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html + + |
+
| CWE Id | +524 | +
| WASC Id | +13 | +
| Plugin Id | +10049 | +
Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page \u2014 covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.
", + "instances":[ + { + "id": "1", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "76", + "uri": "http://localhost:3000/ftp", + "nodeName": "http:\/\/localhost:3000\/ftp", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "77", + "uri": "http://localhost:3000/ftp/eastere.gg", + "nodeName": "http:\/\/localhost:3000\/ftp\/eastere.gg", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "74", + "uri": "http://localhost:3000/ftp/package-lock.json.bak", + "nodeName": "http:\/\/localhost:3000\/ftp\/package-lock.json.bak", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "2", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that your web server, application server, load balancer, etc. is configured to set the Content-Security-Policy header.
", + "otherinfo": "", + "reference": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/CSP
https://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.html
https://www.w3.org/TR/CSP/
https://w3c.github.io/webappsec-csp/
https://web.dev/articles/csp
https://caniuse.com/#feat=contentsecuritypolicy
https://content-security-policy.com/
", + "cweid": "693", + "wascid": "15", + "sourceid": "8" + }, + { + "pluginid": "10098", + "alertRef": "10098", + "alert": "Cross-Domain Misconfiguration", + "name": "Cross-Domain Misconfiguration", + "riskcode": "2", + "confidence": "2", + "riskdesc": "Medium (Medium)", + "desc": "Web browser data loading may be possible, due to a Cross Origin Resource Sharing (CORS) misconfiguration on the web server.
", + "instances":[ + { + "id": "3", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Access-Control-Allow-Origin: *", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing." + }, + { + "id": "38", + "uri": "http://localhost:3000/assets/public/favicon_js.ico", + "nodeName": "http:\/\/localhost:3000\/assets\/public\/favicon_js.ico", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Access-Control-Allow-Origin: *", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing." + }, + { + "id": "0", + "uri": "http://localhost:3000/robots.txt", + "nodeName": "http:\/\/localhost:3000\/robots.txt", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Access-Control-Allow-Origin: *", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing." + }, + { + "id": "5", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Access-Control-Allow-Origin: *", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing." + }, + { + "id": "40", + "uri": "http://localhost:3000/styles.css", + "nodeName": "http:\/\/localhost:3000\/styles.css", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Access-Control-Allow-Origin: *", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing." + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that sensitive data is not available in an unauthenticated manner (using IP address white-listing, for instance).
Configure the \"Access-Control-Allow-Origin\" HTTP header to a more restrictive set of domains, or remove all CORS headers entirely, to allow the web browser to enforce the Same Origin Policy (SOP) in a more restrictive manner.
", + "otherinfo": "The CORS misconfiguration on the web server permits cross-domain read requests from arbitrary third party domains, using unauthenticated APIs on this domain. Web browser implementations do not permit arbitrary third parties to read the response from authenticated APIs, however. This reduces the risk somewhat. This misconfiguration could be used by an attacker to access data that is available in an unauthenticated manner, but which uses some other form of security, such as IP address white-listing.
", + "reference": "https://vulncat.fortify.com/en/detail?category=HTML5&subcategory=Overly%20Permissive%20CORS%20Policy
", + "cweid": "264", + "wascid": "14", + "sourceid": "8" + }, + { + "pluginid": "10017", + "alertRef": "10017", + "alert": "Cross-Domain JavaScript Source File Inclusion", + "name": "Cross-Domain JavaScript Source File Inclusion", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "The page includes one or more script files from a third-party domain.
", + "instances":[ + { + "id": "6", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "7", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "93", + "uri": "http://localhost:3000/", + "nodeName": "http:\/\/localhost:3000\/", + "method": "GET", + "param": "//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "8", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.1.0/cookieconsent.min.js", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "10", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "//cdnjs.cloudflare.com/ajax/libs/jquery/2.2.4/jquery.min.js", + "attack": "", + "evidence": "", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure JavaScript source files are loaded from only trusted sources, and the sources can't be controlled by end users of the application.
", + "otherinfo": "", + "reference": "", + "cweid": "829", + "wascid": "15", + "sourceid": "8" + }, + { + "pluginid": "90004", + "alertRef": "90004-2", + "alert": "Cross-Origin-Embedder-Policy Header Missing or Invalid", + "name": "Cross-Origin-Embedder-Policy Header Missing or Invalid", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "Cross-Origin-Embedder-Policy header is a response header that prevents a document from loading any cross-origin resources that don't explicitly grant the document permission (using CORP or CORS).
", + "instances":[ + { + "id": "28", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "Cross-Origin-Embedder-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "96", + "uri": "http://localhost:3000/ftp", + "nodeName": "http:\/\/localhost:3000\/ftp", + "method": "GET", + "param": "Cross-Origin-Embedder-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "112", + "uri": "http://localhost:3000/juice-shop/build/routes/assets/public/favicon_js.ico", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/assets\/public\/favicon_js.ico", + "method": "GET", + "param": "Cross-Origin-Embedder-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "115", + "uri": "http://localhost:3000/juice-shop/build/routes/fileServer.js:43:13", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/fileServer.js:43:13", + "method": "GET", + "param": "Cross-Origin-Embedder-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "34", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "Cross-Origin-Embedder-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that the application/web server sets the Cross-Origin-Embedder-Policy header appropriately, and that it sets the Cross-Origin-Embedder-Policy header to 'require-corp' for documents.
If possible, ensure that the end user uses a standards-compliant and modern web browser that supports the Cross-Origin-Embedder-Policy header (https://caniuse.com/mdn-http_headers_cross-origin-embedder-policy).
", + "otherinfo": "", + "reference": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-Origin-Embedder-Policy
", + "cweid": "693", + "wascid": "14", + "sourceid": "8" + }, + { + "pluginid": "90004", + "alertRef": "90004-3", + "alert": "Cross-Origin-Opener-Policy Header Missing or Invalid", + "name": "Cross-Origin-Opener-Policy Header Missing or Invalid", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "Cross-Origin-Opener-Policy header is a response header that allows a site to control if others included documents share the same browsing context. Sharing the same browsing context with untrusted documents might lead to data leak.
", + "instances":[ + { + "id": "30", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "Cross-Origin-Opener-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "98", + "uri": "http://localhost:3000/ftp", + "nodeName": "http:\/\/localhost:3000\/ftp", + "method": "GET", + "param": "Cross-Origin-Opener-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "114", + "uri": "http://localhost:3000/juice-shop/build/routes/assets/public/favicon_js.ico", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/assets\/public\/favicon_js.ico", + "method": "GET", + "param": "Cross-Origin-Opener-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "117", + "uri": "http://localhost:3000/juice-shop/build/routes/fileServer.js:43:13", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/fileServer.js:43:13", + "method": "GET", + "param": "Cross-Origin-Opener-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + }, + { + "id": "36", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "Cross-Origin-Opener-Policy", + "attack": "", + "evidence": "", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that the application/web server sets the Cross-Origin-Opener-Policy header appropriately, and that it sets the Cross-Origin-Opener-Policy header to 'same-origin' for documents.
'same-origin-allow-popups' is considered as less secured and should be avoided.
If possible, ensure that the end user uses a standards-compliant and modern web browser that supports the Cross-Origin-Opener-Policy header (https://caniuse.com/mdn-http_headers_cross-origin-opener-policy).
", + "otherinfo": "", + "reference": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Cross-Origin-Opener-Policy
", + "cweid": "693", + "wascid": "14", + "sourceid": "8" + }, + { + "pluginid": "10110", + "alertRef": "10110", + "alert": "Dangerous JS Functions", + "name": "Dangerous JS Functions", + "riskcode": "1", + "confidence": "1", + "riskdesc": "Low (Low)", + "desc": "A dangerous JS function seems to be in use that would leave the site vulnerable.
", + "instances":[ + { + "id": "67", + "uri": "http://localhost:3000/main.js", + "nodeName": "http:\/\/localhost:3000\/main.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "bypassSecurityTrustHtml(", + "otherinfo": "" + }, + { + "id": "72", + "uri": "http://localhost:3000/vendor.js", + "nodeName": "http:\/\/localhost:3000\/vendor.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "bypassSecurityTrustHtml(", + "otherinfo": "" + } + ], + "count": "2", + "systemic": false, + "solution": "See the references for security advice on the use of these functions.
", + "otherinfo": "", + "reference": "https://v17.angular.io/guide/security
", + "cweid": "749", + "wascid": "-1", + "sourceid": "22" + }, + { + "pluginid": "10063", + "alertRef": "10063-2", + "alert": "Deprecated Feature Policy Header Set", + "name": "Deprecated Feature Policy Header Set", + "riskcode": "1", + "confidence": "2", + "riskdesc": "Low (Medium)", + "desc": "The header has now been renamed to Permissions-Policy.
", + "instances":[ + { + "id": "27", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Feature-Policy", + "otherinfo": "" + }, + { + "id": "68", + "uri": "http://localhost:3000/main.js", + "nodeName": "http:\/\/localhost:3000\/main.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Feature-Policy", + "otherinfo": "" + }, + { + "id": "46", + "uri": "http://localhost:3000/polyfills.js", + "nodeName": "http:\/\/localhost:3000\/polyfills.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Feature-Policy", + "otherinfo": "" + }, + { + "id": "43", + "uri": "http://localhost:3000/runtime.js", + "nodeName": "http:\/\/localhost:3000\/runtime.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Feature-Policy", + "otherinfo": "" + }, + { + "id": "32", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Feature-Policy", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "Ensure that your web server, application server, load balancer, etc. is configured to set the Permissions-Policy header instead of the Feature-Policy header.
", + "otherinfo": "", + "reference": "https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Permissions-Policy
https://scotthelme.co.uk/goodbye-feature-policy-and-hello-permissions-policy/
", + "cweid": "16", + "wascid": "15", + "sourceid": "8" + }, + { + "pluginid": "10096", + "alertRef": "10096", + "alert": "Timestamp Disclosure - Unix", + "name": "Timestamp Disclosure - Unix", + "riskcode": "1", + "confidence": "1", + "riskdesc": "Low (Low)", + "desc": "A timestamp was disclosed by the application/web server. - Unix
", + "instances":[ + { + "id": "16", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1650485437", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37." + }, + { + "id": "21", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1981395349", + "otherinfo": "1981395349, which evaluates to: 2032-10-14 19:35:49." + }, + { + "id": "18", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "2038834951", + "otherinfo": "2038834951, which evaluates to: 2034-08-10 15:02:31." + }, + { + "id": "20", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "1650485437", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37." + }, + { + "id": "23", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "2038834951", + "otherinfo": "2038834951, which evaluates to: 2034-08-10 15:02:31." + } + ], + "count": "5", + "systemic": true, + "solution": "Manually confirm that the timestamp data is not sensitive, and that the data cannot be aggregated to disclose exploitable patterns.
", + "otherinfo": "1650485437, which evaluates to: 2022-04-20 20:10:37.
", + "reference": "https://cwe.mitre.org/data/definitions/200.html
", + "cweid": "497", + "wascid": "13", + "sourceid": "8" + }, + { + "pluginid": "10027", + "alertRef": "10027", + "alert": "Information Disclosure - Suspicious Comments", + "name": "Information Disclosure - Suspicious Comments", + "riskcode": "0", + "confidence": "1", + "riskdesc": "Informational (Low)", + "desc": "The response appears to contain suspicious comments which may help an attacker.
", + "instances":[ + { + "id": "65", + "uri": "http://localhost:3000/main.js", + "nodeName": "http:\/\/localhost:3000\/main.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "query", + "otherinfo": "The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//owasp.org' target='_blank'>Open Worldwide Application Security Project (OWASP) and is developed and maintained by voluntee\", see evidence field for the suspicious comment/snippet." + }, + { + "id": "70", + "uri": "http://localhost:3000/vendor.js", + "nodeName": "http:\/\/localhost:3000\/vendor.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "Query", + "otherinfo": "The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//www.w3.org/2000/svg\" viewBox=\"0 0 512 512\">The following pattern was used: \\bQUERY\\b and was detected in likely comment: \"//owasp.org' target='_blank'>Open Worldwide Application Security Project (OWASP) and is developed and maintained by voluntee\", see evidence field for the suspicious comment/snippet.
", + "reference": "", + "cweid": "615", + "wascid": "13", + "sourceid": "22" + }, + { + "pluginid": "10109", + "alertRef": "10109", + "alert": "Modern Web Application", + "name": "Modern Web Application", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The application appears to be a modern web application. If you need to explore it automatically then the Ajax Spider may well be more effective than the standard one.
", + "instances":[ + { + "id": "13", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "107", + "uri": "http://localhost:3000/", + "nodeName": "http:\/\/localhost:3000\/", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "108", + "uri": "http://localhost:3000/juice-shop/build/routes/assets/public/favicon_js.ico", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/assets\/public\/favicon_js.ico", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "109", + "uri": "http://localhost:3000/juice-shop/build/routes/fileServer.js:43:13", + "nodeName": "http:\/\/localhost:3000\/juice-shop\/build\/routes\/fileServer.js:43:13", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + }, + { + "id": "15", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application." + } + ], + "count": "5", + "systemic": true, + "solution": "This is an informational alert and so no changes are required.
", + "otherinfo": "No links have been found while there are scripts, which is an indication that this is a modern web application.
", + "reference": "", + "cweid": "-1", + "wascid": "-1", + "sourceid": "8" + }, + { + "pluginid": "10049", + "alertRef": "10049-1", + "alert": "Non-Storable Content", + "name": "Non-Storable Content", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The response contents are not storable by caching components such as proxy servers. If the response does not contain sensitive, personal or user-specific information, it may benefit from being stored and cached, to improve performance.
", + "instances":[ + { + "id": "84", + "uri": "http://localhost:3000/ftp/coupons_2013.md.bak", + "nodeName": "http:\/\/localhost:3000\/ftp\/coupons_2013.md.bak", + "method": "GET", + "param": "", + "attack": "", + "evidence": "403", + "otherinfo": "" + }, + { + "id": "79", + "uri": "http://localhost:3000/ftp/package-lock.json.bak", + "nodeName": "http:\/\/localhost:3000\/ftp\/package-lock.json.bak", + "method": "GET", + "param": "", + "attack": "", + "evidence": "403", + "otherinfo": "" + } + ], + "count": "2", + "systemic": true, + "solution": "The content may be marked as storable by ensuring that the following conditions are satisfied:
The request method must be understood by the cache and defined as being cacheable (\"GET\", \"HEAD\", and \"POST\" are currently defined as cacheable)
The response status code must be understood by the cache (one of the 1XX, 2XX, 3XX, 4XX, or 5XX response classes are generally understood)
The \"no-store\" cache directive must not appear in the request or response header fields
For caching by \"shared\" caches such as \"proxy\" caches, the \"private\" response directive must not appear in the response
For caching by \"shared\" caches such as \"proxy\" caches, the \"Authorization\" header field must not appear in the request, unless the response explicitly allows it (using one of the \"must-revalidate\", \"public\", or \"s-maxage\" Cache-Control response directives)
In addition to the conditions above, at least one of the following conditions must also be satisfied by the response:
It must contain an \"Expires\" header field
It must contain a \"max-age\" response directive
For \"shared\" caches such as \"proxy\" caches, it must contain a \"s-maxage\" response directive
It must contain a \"Cache Control Extension\" that allows it to be cached
It must have a status code that is defined as cacheable by default (200, 203, 204, 206, 300, 301, 404, 405, 410, 414, 501).
", + "otherinfo": "", + "reference": "https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231
https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
", + "cweid": "524", + "wascid": "13", + "sourceid": "41" + }, + { + "pluginid": "10049", + "alertRef": "10049-3", + "alert": "Storable and Cacheable Content", + "name": "Storable and Cacheable Content", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The response contents are storable by caching components such as proxy servers, and may be retrieved directly from the cache, rather than from the origin server by the caching servers, in response to similar requests from other users. If the response data is sensitive, personal or user-specific, this may result in sensitive information being leaked. In some cases, this may even result in a user gaining complete control of the session of another user, depending on the configuration of the caching components in use in their environment. This is primarily an issue where \"shared\" caching servers such as \"proxy\" caches are configured on the local network. This configuration is typically found in corporate or educational environments, for instance.
", + "instances":[ + { + "id": "25", + "uri": "http://localhost:3000/robots.txt", + "nodeName": "http:\/\/localhost:3000\/robots.txt", + "method": "GET", + "param": "", + "attack": "", + "evidence": "", + "otherinfo": "In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234." + } + ], + "count": "1", + "systemic": true, + "solution": "Validate that the response does not contain sensitive, personal or user-specific information. If it does, consider the use of the following HTTP response headers, to limit, or prevent the content being stored and retrieved from the cache by another user:
Cache-Control: no-cache, no-store, must-revalidate, private
Pragma: no-cache
Expires: 0
This configuration directs both HTTP 1.0 and HTTP 1.1 compliant caching servers to not store the response, and to not retrieve the response (without validation) from the cache, in response to a similar request.
", + "otherinfo": "In the absence of an explicitly specified caching lifetime directive in the response, a liberal lifetime heuristic of 1 year was assumed. This is permitted by rfc7234.
", + "reference": "https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231
https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
", + "cweid": "524", + "wascid": "13", + "sourceid": "6" + }, + { + "pluginid": "10049", + "alertRef": "10049-2", + "alert": "Storable but Non-Cacheable Content", + "name": "Storable but Non-Cacheable Content", + "riskcode": "0", + "confidence": "2", + "riskdesc": "Informational (Medium)", + "desc": "The response contents are storable by caching components such as proxy servers, but will not be retrieved directly from the cache, without validating the request upstream, in response to similar requests from other users.
", + "instances":[ + { + "id": "26", + "uri": "http://localhost:3000", + "nodeName": "http:\/\/localhost:3000", + "method": "GET", + "param": "", + "attack": "", + "evidence": "max-age=0", + "otherinfo": "" + }, + { + "id": "39", + "uri": "http://localhost:3000/assets/public/favicon_js.ico", + "nodeName": "http:\/\/localhost:3000\/assets\/public\/favicon_js.ico", + "method": "GET", + "param": "", + "attack": "", + "evidence": "max-age=0", + "otherinfo": "" + }, + { + "id": "45", + "uri": "http://localhost:3000/polyfills.js", + "nodeName": "http:\/\/localhost:3000\/polyfills.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "max-age=0", + "otherinfo": "" + }, + { + "id": "42", + "uri": "http://localhost:3000/runtime.js", + "nodeName": "http:\/\/localhost:3000\/runtime.js", + "method": "GET", + "param": "", + "attack": "", + "evidence": "max-age=0", + "otherinfo": "" + }, + { + "id": "29", + "uri": "http://localhost:3000/sitemap.xml", + "nodeName": "http:\/\/localhost:3000\/sitemap.xml", + "method": "GET", + "param": "", + "attack": "", + "evidence": "max-age=0", + "otherinfo": "" + } + ], + "count": "5", + "systemic": true, + "solution": "", + "otherinfo": "", + "reference": "https://datatracker.ietf.org/doc/html/rfc7234
https://datatracker.ietf.org/doc/html/rfc7231
https://www.w3.org/Protocols/rfc2616/rfc2616-sec13.html
", + "cweid": "524", + "wascid": "13", + "sourceid": "8" + } + ] + } + ], + "sequences":[ + ] + +} diff --git a/labs/lab5/zap/zap-report.xml b/labs/lab5/zap/zap-report.xml new file mode 100644 index 00000000..dd2f3c74 --- /dev/null +++ b/labs/lab5/zap/zap-report.xml @@ -0,0 +1,969 @@ + +