See our demo project in action!
This is a demo results view for an example codebase.
Try clicking on the vulnerabilities to see more details.
juice-shop
Summary | File Path | |
---|---|---|
Critical | Detected unsafe sequelize statement using tainted user-input. | /data/static/codefixes/dbSchemaChallenge_1.ts |
Critical | Detected unsafe sequelize statement using tainted user-input. | /data/static/codefixes/dbSchemaChallenge_3.ts |
Critical | Detected unsafe sequelize statement using tainted user-input. | /data/static/codefixes/unionSqlInjectionChallenge_... |
Critical | Detected unsafe sequelize statement using tainted user-input. | /data/static/codefixes/unionSqlInjectionChallenge_... |
Critical | Detected unsafe sequelize statement using tainted user-input. | /routes/login.ts |
Critical | Detected unsafe sequelize statement using tainted user-input. | /routes/search.ts |
High | Detected hard-coded JWT secret. | /lib/insecurity.ts |
High | Application performs open redirection via user-supplied input. | /routes/redirect.ts |
Medium | Use of raw SQL queries without data binding found. | /data/static/codefixes/dbSchemaChallenge_1.ts |
Medium | Detected usage of user input to manually construct SQL strings. | /data/static/codefixes/dbSchemaChallenge_1.ts |
Page 1 of 22