You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
detailsRecommended version: 4.17.23 Description: A Prototype Pollution vulnerability was discovered in lodash prior to 4.17.12, in lodash.defaultsdeep prior to 4.6.1, and in @sailshq/lodash prior ... Attack Vector: NETWORK Attack Complexity: LOW Vulnerable Package
detailsDescription: The malicious payload in this package has the ability to corrupt or destroy files on disk ### About File wiping or file destruction is a type of r... Vulnerable Package
detailsDescription: This package exfiltrates stored credentials and sensitive information ### About Data exfiltration may be done in numerous ways such as through HTT... Vulnerable Package
detailsDescription: This package includes functionality which aims to protest or raise an issue and might include undesired behavior. ### About Similar to a malicious... Vulnerable Package
detailsDescription: This package executes a crypto mining software ### About Using a dynamic analysis environment (also known as a Sandbox) we can monitor filesystem ... Vulnerable Package
detailsDescription: This package name is similar to other popular package "moment" ### About Typosquatting attacks relies on user type errors being inputted into inst... Vulnerable Package
detailsDescription: This package executes a crypto mining software ### About Using a dynamic analysis environment (also known as a Sandbox) we can monitor filesystem ... Vulnerable Package
detailsDescription: This package was manually inspected by a security researcher and flagged as malicious ### About Classifying malicious packages is an internal proc... Vulnerable Package
detailsDescription: This package exfiltrates computer and operating system information ### About Data exfiltration may be done in numerous ways such as through HTTP r... Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```ea131cc5ccf6aa6544d6cb29cdb78130feed061d2097c6903215be1499464c2e``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package was manually inspected by a security researcher and flagged as malicious ### About Classifying malicious packages is an internal proc... Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```7f986cd3c946f274cdec73f80b84855a77bc2a3c765d68897fbc42835629a5d5``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package exfiltrates computer and operating system information ### About Data exfiltration may be done in numerous ways such as through HTTP r... Vulnerable Package
detailsDescription: This package was manually inspected by a security researcher and flagged as malicious ### About Classifying malicious packages is an internal proc... Vulnerable Package
detailsDescription: This package is using dependency confusion attack ### About Dependency Confusion is a technique discovered by [@alex.birsan](https://medium\.com/@a\.\.\. Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```7f986cd3c946f274cdec73f80b84855a77bc2a3c765d68897fbc42835629a5d5``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package exfiltrates stored credentials and sensitive information ### About Data exfiltration may be done in numerous ways such as through HTT... Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```2a3acdcd76575762b18c18c644a745125f55ce121f742d2aad962521bc7f25fd``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package was manually inspected by a security researcher and flagged as malicious ### About Classifying malicious packages is an internal proc... Vulnerable Package
detailsDescription: This package downloads a harmful file. File hash: ```ea131cc5ccf6aa6544d6cb29cdb78130feed061d2097c6903215be1499464c2e``` ### About Using a dynamic... Vulnerable Package
detailsDescription: This package was manually inspected by a security researcher and flagged as malicious ### About Classifying malicious packages is an internal proc... Vulnerable Package
detailsThe application's method executes an SQL query with executeQuery, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The application con...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The application con...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 37 of /src/main/java/org/cysecurity/cspf/jvl/controller/sqs.java. The ...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 40 of /src/main/webapp/vulnerability/csrf/changepassword.jsp. The app...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 127 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 119 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 117 of /src/main/java/org/cysecurity/cspf/jvl/controller/Install.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/EmailCheck.java...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator....Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/UsernameCheck.j...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 52 of /src/main/java/org/cysecurity/cspf/jvl/controller/LoginValidator....Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The application constru...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The application constru...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 43 of /src/main/webapp/changeCardDetails.jsp. The application constru...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 32 of /src/main/webapp/vulnerability/idor/change-email.jsp. The appl...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 31 of /src/main/webapp/vulnerability/csrf/change-info.jsp. The appli...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 24 of /src/main/webapp/vulnerability/sqli/download_id_union.jsp. The...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 24 of /src/main/webapp/vulnerability/sqli/download_id.jsp. The applic...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 29 of /src/main/webapp/myprofile.jsp. The application constructs this ...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 21 of /src/main/webapp/myprofile.jsp. The application constructs this ...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 13 of /src/main/webapp/vulnerability/UserDetails.jsp. The application ...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 59 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 58 of /src/main/java/org/cysecurity/cspf/jvl/controller/Register.java...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 32 of /src/main/webapp/vulnerability/idor/change-email.jsp. The appl...Attack Vector
detailsThe application's method executes an SQL query with executeUpdate, at line 14 of /src/main/webapp/admin/manageusers.jsp. The application constru...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 19 of /src/main/webapp/admin/adminlogin.jsp. The application construct...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 14 of /src/main/webapp/vulnerability/forumposts.jsp. The application c...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 42 of /src/main/webapp/ForgotPassword.jsp. The application constructs ...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 42 of /src/main/webapp/ForgotPassword.jsp. The application constructs ...Attack Vector
detailsThe application's method executes an SQL query with executeQuery, at line 16 of /src/main/webapp/vulnerability/DisplayMessage.jsp. The applicati...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 43 of /src/main/webapp/changeCardDetails.jsp. The application constructs...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 31 of /src/main/webapp/vulnerability/csrf/change-info.jsp. The applicat...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 40 of /src/main/webapp/vulnerability/csrf/changepassword.jsp. The applic...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The application const...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 43 of /src/main/webapp/changeCardDetails.jsp. The application constructs...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 31 of /src/main/webapp/vulnerability/csrf/change-info.jsp. The applicat...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 40 of /src/main/webapp/vulnerability/csrf/changepassword.jsp. The applic...Attack Vector
detailsThe application's method executes an SQL query with BinaryExpr, at line 14 of /src/main/webapp/vulnerability/Messages.jsp. The application const...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 50 of /src/main/webapp/vulnerability/Injection/orm.jsp. This untrusted ...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 52 of /src/main/webapp/changeCardDetails.jsp. This untrusted data is em...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 35 of /src/main/webapp/vulnerability/csrf/change-info.jsp. This untrus...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 32 of /src/main/webapp/vulnerability/forum.jsp. This untrusted data is ...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 24 of /src/main/webapp/vulnerability/forum.jsp. This untrusted data is ...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 5 of /src/main/webapp/index.jsp. This untrusted data is embedded into t...Attack Vector
detailsThe method embeds untrusted data in generated output with getAttribute, at line 21 of /src/main/webapp/vulnerability/SendMessage.jsp. This untru...Attack Vector
detailsThe method embeds untrusted data in generated output with print, at line 148 of /src/main/webapp/header.jsp. This untrusted data is embedded int...Attack Vector
*AI agents that triage & remediate new issues in your PR scan. Learn more
Use @Checkmarx to interact with Checkmarx PR Assistant. New: ask the AI agent for remediation and automatically create a new pull request. Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR @Checkmarx remediate issues 1, 2, 7
While lodash 4.17.11 is declared in package.json, it is never imported or used anywhere in the application code. The vulnerable defaultsDeep function cannot be reached through any execution path.
The vulnerable code executes only during Docker build phase via npm postinstall hooks, which is explicitly excluded from reachability definition. No runtime execution path exists in the Java-based production application.
The malicious package is declared but never imported, used, or installed in the application. No code paths lead to ua-parser-js execution, and the package.json appears to be a demonstration file rather than functional configuration for this Java application.
The vulnerable node-ipc package is declared but never imported or invoked anywhere in the application code. This is a Java web application with no Node.js runtime usage, making the package completely unreachable through application execution paths.
The vulnerable 'scs' package is never imported or invoked in the application code. This Java-based application has no Node.js runtime integration, and the Docker container has no mechanisms to execute the package at runtime.
6. Cx43050644-3add · Critical
Triage context: Reachable · Exploitable
The typosquatted package is exploitable through automatic execution of malicious npm lifecycle hooks during installation. This requires only running npm install (a standard operation) with no authentication, user interaction, or special conditions, making it a low-complexity, high-impact supply chain attack.
The package is declared but never imported or used anywhere in the application code. No runtime execution paths exist that would invoke ua-parser-js. Installation-time execution does not constitute reachability per the definition excluding build/development environments.
The malicious 'momnet' package is declared but never imported or used in the application code. While it could execute during npm install, this occurs only in development/build environments, which are explicitly excluded from reachability assessment per the guidelines.
The 'scs' package is present in node_modules but has no import statements, require calls, or execution paths in the application code. Static analysis confirms zero integration points, making the malicious functionality unreachable.
10. Cx4eb613b4-04e7 · Critical
Triage context: Reachable · Not Exploitable
Exploitation is confined to build-time execution during npm install in CI/CD pipelines. The framework explicitly excludes vulnerabilities only reachable in development, testing, or build environments from being considered exploitable in production, and no runtime execution paths exist.
Use @Checkmarx to interact with Checkmarx PR Assistant. New: ask the AI agent for remediation and automatically create a new pull request. Examples: @Checkmarx how are you able to help me? @Checkmarx remediate issues 1, 2, 7
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
test if mal packs are shown in PR deco