ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Founded in 1981 with a single store in the Northwest of England, JD Group has grown into a leading global omni-channel retailer in Sports Fashion, Outdoors, and Gyms. Our diverse and dedicated teams operate across a portfolio of renowned retail brands in multiple international markets. Listed on the London Stock Exchange since 1996 and a proud member of the FTSE100 since 2019, JD Group continues to expand both in the UK and globally driven by a commitment to innovation, excellence, and possibility. Our vision is to become the world’s most trusted and dynamic omni-channel retailer in the sports and outdoor industry. We welcome individuals from all backgrounds to join us in shaping this future. If you're passionate about contributing to an inclusive, people-first, and customer-centric organisation and are motivated by continuous growth and operational excellence we’d love to hear from you.

JD Sports Fashion A.I CyberSecurity Scoring

JSF

Company Details

Linkedin ID:

jd-sports-fashion-plc

Employees number:

27,171

Number of followers:

238,758

NAICS:

43

Industry Type:

Retail

Homepage:

jdplc.com

IP Addresses:

40

Company ID:

JD _3962051

Scan Status:

Completed

AI scoreJSF Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/jd-sports-fashion-plc.jpeg
JSF Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreJSF Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/jd-sports-fashion-plc.jpeg
JSF Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

JSF Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
The Finish Line, Inc.Breach6031/2013
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The California Attorney General reported a data breach involving The Finish Line, Inc. on March 26, 2013. The breach occurred on January 11, 2013, when a laptop containing personal information, including Social Security numbers, was stolen from an employee's vehicle. The number of individuals affected is unknown.

JD Sports FashionData Leak50201/2023
Rankiteo Explanation :
Attack limited on finance or reputation

Description: JD Sports Fashion Plc was the target of a cyberattack that led to unauthorised access to a system that included consumer information related to some online orders. Limited data is affected. JD Sports does not own the complete set of credit card information, and it is also unlikely that account passwords have been compromised. About 10 million distinct customers' names, billing and delivery addresses, email and phone numbers, order information, and the last four digits of their credit cards are among the facts that may have been accessed. The business claimed to have taken the immediate actions required to look into and address the situation, including collaborating with top cyber security specialists.

SPRINTERBreach100511/2023
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: A cyberattack has affected Sprinter Sports, a retail business that was formerly known as Perry Sport and Aktiesport. Customers are advised by the corporation to be very watchful for any strange activity on their bank account. Together with cyber experts, the retail chain claimed to have carried out a comprehensive and methodical examination of the cyberattack. Sprinter warns clients to be on the lookout for abnormal bank account activity even if the retail chain claims it does not retain full payment card information.

The Finish Line, Inc.
Breach
Severity: 60
Impact: 3
Seen: 1/2013
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The California Attorney General reported a data breach involving The Finish Line, Inc. on March 26, 2013. The breach occurred on January 11, 2013, when a laptop containing personal information, including Social Security numbers, was stolen from an employee's vehicle. The number of individuals affected is unknown.

JD Sports Fashion
Data Leak
Severity: 50
Impact: 2
Seen: 01/2023
Blog:
Rankiteo Explanation
Attack limited on finance or reputation

Description: JD Sports Fashion Plc was the target of a cyberattack that led to unauthorised access to a system that included consumer information related to some online orders. Limited data is affected. JD Sports does not own the complete set of credit card information, and it is also unlikely that account passwords have been compromised. About 10 million distinct customers' names, billing and delivery addresses, email and phone numbers, order information, and the last four digits of their credit cards are among the facts that may have been accessed. The business claimed to have taken the immediate actions required to look into and address the situation, including collaborating with top cyber security specialists.

SPRINTER
Breach
Severity: 100
Impact: 5
Seen: 11/2023
Blog:
Rankiteo Explanation
Attack threatening the organization’s existence

Description: A cyberattack has affected Sprinter Sports, a retail business that was formerly known as Perry Sport and Aktiesport. Customers are advised by the corporation to be very watchful for any strange activity on their bank account. Together with cyber experts, the retail chain claimed to have carried out a comprehensive and methodical examination of the cyberattack. Sprinter warns clients to be on the lookout for abnormal bank account activity even if the retail chain claims it does not retain full payment card information.

Ailogo

JSF Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for JSF

Incidents vs Retail Industry Average (This Year)

No incidents recorded for JD Sports Fashion in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for JD Sports Fashion in 2025.

Incident Types JSF vs Retail Industry Avg (This Year)

No incidents recorded for JD Sports Fashion in 2025.

Incident History — JSF (X = Date, Y = Severity)

JSF cyber incidents detection timeline including parent company and subsidiaries

JSF Company Subsidiaries

SubsidiaryImage

Founded in 1981 with a single store in the Northwest of England, JD Group has grown into a leading global omni-channel retailer in Sports Fashion, Outdoors, and Gyms. Our diverse and dedicated teams operate across a portfolio of renowned retail brands in multiple international markets. Listed on the London Stock Exchange since 1996 and a proud member of the FTSE100 since 2019, JD Group continues to expand both in the UK and globally driven by a commitment to innovation, excellence, and possibility. Our vision is to become the world’s most trusted and dynamic omni-channel retailer in the sports and outdoor industry. We welcome individuals from all backgrounds to join us in shaping this future. If you're passionate about contributing to an inclusive, people-first, and customer-centric organisation and are motivated by continuous growth and operational excellence we’d love to hear from you.

Loading...
similarCompanies

JSF Similar Companies

Kohl's

Kohl’s is a leading omnichannel retailer with more than 1,100 stores in 49 states. Kohl's business is built on a solid foundation of more than 60 million customers, an unmatched brand portfolio, industry-leading loyalty and Kohl's Card programs, a convenient and accessible nationwide store footprin

Shoppers Drug Mart

Built on a foundation of professional expertise and personal service, Shoppers Drug Mart has been meeting Canadians'​ health care needs for 50 years. What was once a small pharmacy in Toronto has grown into an organization of over 1,200 stores from coast to coast, becoming an indelible part of the l

DMart - Avenue Supermarts Ltd

“DMart is a one-stop supermarket chain that aims to offer customers a wide range of basic home and personal products under one roof. Each DMart store stocks home utility products - including food, toiletries, beauty products, garments, kitchenware, bed and bath linen, home appliances and more - avai

H-E-B

H-E-B is headquartered in San Antonio, Texas with approximately $32 billion in revenue and 117,000+ Partners. Founded in 1905, H-E-B operates more than 400 stores in a number of formats, including superstores, supermarkets and gourmet markets. H-E-B is the #1 food retailer in the Austin, San Antoni

At Next we never underestimate what we can do. Bring your energy, play to your strengths and never shy away from change. Push yourself and back others. Make things happen that will be bigger and better than before. Come and work for one of the UK’s biggest retailers. It is everything you could ima

Old Navy

Forget what you know about old-school industry rules. When you work at Old Navy, you’re choosing a different path. From day one, we’ve been on a mission to democratize fashion and make shopping fun again. Our teams make style accessible to everyone, creating high-quality, must-have fashion essential

L Brands

On August 2, 2021, L Brands (NYSE: LB) completed the separation of the Victoria’s Secret business into an independent, public company through a tax-free spin-off to L Brands shareholders. The new company, named Victoria’s Secret & Co., includes Victoria’s Secret Lingerie, PINK and Victoria’s Secret

Metro Inc.

With annual sales of more than $21 billion, METRO Inc. is a food and pharmacy leader in Québec and Ontario, providing employment to more than 97,000 people. Its purpose is to Nourish the health and well-being of our communities. As a retailer, franchisor, distributor, manufacturer, and provider of e

Williams-Sonoma, Inc.

Founded in 1956, Williams-Sonoma, Inc. is the premier specialty retailer of high-quality products for the home. Our family of brands includes Williams Sonoma, Pottery Barn, Pottery Barn Kids, PBteen, West Elm, Williams-Sonoma Home, Rejuvenation, and Mark and Graham. These brands are among the best

newsone

JSF CyberSecurity News

November 20, 2025 08:52 AM
JD Sports Fashion tempers profit view amid strained consumer finances

JD Sports Fashion PLC on Thursday guided to low-end annual profit pointing to weaker macroeconomic and consumer indicators in recent weeks.

November 20, 2025 08:02 AM
JD Sports Sees Profit at Bottom End of Consensus Due to Macroeconomic, Consumer Volatility

JD Sports JD 0.38%increase; green up pointing triangle Fashion said it expects profit for fiscal 2026 at the bottom end of consensus,...

October 31, 2025 07:00 AM
ISE to launch new CyberSecurity Summit for 2026

ISE has announced the launch of a new CyberSecurity Summit at the 2026 exhibition, reacting to the mounting challenges of digital threats...

October 04, 2025 07:00 AM
With EPS Growth And More, JD Sports Fashion (LON:JD.) Makes An Interesting Case

For beginners, it can seem like a good idea (and an exciting prospect) to buy a company that tells a good story to investors,...

September 26, 2025 07:00 AM
Stockpickers: M&C Saatchi, Keystone Law, JD Sports Fashion

Our experts discuss which companies to buy, sell or hold this week.

August 27, 2025 07:00 AM
JD Sports Fashion Shares Rise on $135 Million Buyback, Guidance

The company reiterated that it doesn't expect any direct impact from tariffs.

August 06, 2025 07:00 AM
What do the Pandora, M&S and Co-op cyber-attacks mean for UK retailers?

Jewellery specialist Pandora has become the latest retailer to face a cyber-attack, with the brand confirming yesterday (5 August) that some...

July 21, 2025 07:00 AM
JD Sports Fashion Plc's (LON:JD.) Intrinsic Value Is Potentially 39% Above Its Share Price

Key Insights The projected fair value for JD Sports Fashion is UK£1.20 based on 2 Stage Free Cash Flow to Equity...

July 04, 2025 07:00 AM
Customer data leaked after Louis Vuitton Korea suffers cyberattack

News distribution : Louis Vuitton Korea confirmed a June 8 cyberattack that compromised customer contact data. It's the second breach to hit...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

JSF CyberSecurity History Information

Official Website of JD Sports Fashion

The official website of JD Sports Fashion is https://careers.jdplc.com/.

JD Sports Fashion’s AI-Generated Cybersecurity Score

According to Rankiteo, JD Sports Fashion’s AI-generated cybersecurity score is 732, reflecting their Moderate security posture.

How many security badges does JD Sports Fashion’ have ?

According to Rankiteo, JD Sports Fashion currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does JD Sports Fashion have SOC 2 Type 1 certification ?

According to Rankiteo, JD Sports Fashion is not certified under SOC 2 Type 1.

Does JD Sports Fashion have SOC 2 Type 2 certification ?

According to Rankiteo, JD Sports Fashion does not hold a SOC 2 Type 2 certification.

Does JD Sports Fashion comply with GDPR ?

According to Rankiteo, JD Sports Fashion is not listed as GDPR compliant.

Does JD Sports Fashion have PCI DSS certification ?

According to Rankiteo, JD Sports Fashion does not currently maintain PCI DSS compliance.

Does JD Sports Fashion comply with HIPAA ?

According to Rankiteo, JD Sports Fashion is not compliant with HIPAA regulations.

Does JD Sports Fashion have ISO 27001 certification ?

According to Rankiteo,JD Sports Fashion is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of JD Sports Fashion

JD Sports Fashion operates primarily in the Retail industry.

Number of Employees at JD Sports Fashion

JD Sports Fashion employs approximately 27,171 people worldwide.

Subsidiaries Owned by JD Sports Fashion

JD Sports Fashion presently has no subsidiaries across any sectors.

JD Sports Fashion’s LinkedIn Followers

JD Sports Fashion’s official LinkedIn profile has approximately 238,758 followers.

NAICS Classification of JD Sports Fashion

JD Sports Fashion is classified under the NAICS code 43, which corresponds to Retail Trade.

JD Sports Fashion’s Presence on Crunchbase

No, JD Sports Fashion does not have a profile on Crunchbase.

JD Sports Fashion’s Presence on LinkedIn

Yes, JD Sports Fashion maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/jd-sports-fashion-plc.

Cybersecurity Incidents Involving JD Sports Fashion

As of November 27, 2025, Rankiteo reports that JD Sports Fashion has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

JD Sports Fashion has an estimated 15,247 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at JD Sports Fashion ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach and Data Leak.

How does JD Sports Fashion detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with top cyber security specialists, and third party assistance with cyber experts, and communication strategy with customer advisory..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: JD Sports Fashion Plc Cyberattack

Description: JD Sports Fashion Plc experienced a cyberattack resulting in unauthorized access to consumer information related to some online orders.

Type: Data Breach

Incident : Cyberattack

Title: Cyberattack on Sprinter Sports

Description: A cyberattack has affected Sprinter Sports, a retail business that was formerly known as Perry Sport and Aktiesport. Customers are advised by the corporation to be very watchful for any strange activity on their bank account. Together with cyber experts, the retail chain claimed to have carried out a comprehensive and methodical examination of the cyberattack. Sprinter warns clients to be on the lookout for abnormal bank account activity even if the retail chain claims it does not retain full payment card information.

Type: Cyberattack

Incident : Data Breach

Title: Data Breach at The Finish Line, Inc.

Description: A laptop containing personal information, including Social Security numbers, was stolen from an employee's vehicle.

Date Detected: 2013-01-11

Date Publicly Disclosed: 2013-03-26

Type: Data Breach

Attack Vector: Physical Theft

Vulnerability Exploited: Unsecured Laptop

Threat Actor: Unknown

Motivation: Unknown

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach JDS563723

Data Compromised: Names, Billing and delivery addresses, Email and phone numbers, Order information, Last four digits of credit cards

Incident : Cyberattack SPR13275224

Payment Information Risk: High

Incident : Data Breach JD-427072725

Data Compromised: Personal Information, Social Security Numbers

Systems Affected: Laptop

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Order Information, , Personal Information and Social Security Numbers.

Which entities were affected by each incident ?

Incident : Data Breach JDS563723

Entity Name: JD Sports Fashion Plc

Entity Type: Company

Industry: Retail

Customers Affected: 10 million

Incident : Cyberattack SPR13275224

Entity Name: Sprinter Sports

Entity Type: Retail Business

Industry: Retail

Incident : Data Breach JD-427072725

Entity Name: The Finish Line, Inc.

Entity Type: Company

Industry: Retail

Location: California

Customers Affected: Unknown

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach JDS563723

Third Party Assistance: Top cyber security specialists

Incident : Cyberattack SPR13275224

Third Party Assistance: Cyber Experts

Communication Strategy: Customer Advisory

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Top cyber security specialists, Cyber Experts.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach JDS563723

Type of Data Compromised: Personally identifiable information (pii), Order information

Number of Records Exposed: 10 million

Personally Identifiable Information: Yes

Incident : Data Breach JD-427072725

Type of Data Compromised: Personal Information, Social Security Numbers

Number of Records Exposed: Unknown

Sensitivity of Data: High

Personally Identifiable Information: Yes

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Cyberattack SPR13275224

Recommendations: Customers are advised to monitor their bank accounts for unusual activity.

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Customers are advised to monitor their bank accounts for unusual activity..

References

Where can I find more information about each incident ?

Incident : Data Breach JD-427072725

Source: California Attorney General

Date Accessed: 2013-03-26

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Attorney GeneralDate Accessed: 2013-03-26.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Cyberattack SPR13275224

Investigation Status: Comprehensive and methodical examination carried out

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Customer Advisory.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Cyberattack SPR13275224

Customer Advisories: Sprinter warns clients to be on the lookout for abnormal bank account activity.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Sprinter warns clients to be on the lookout for abnormal bank account activity..

Post-Incident Analysis

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Top cyber security specialists, Cyber Experts.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unknown.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2013-01-11.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2013-03-26.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Billing and delivery addresses, Email and phone numbers, Order information, Last four digits of credit cards, , Personal Information and Social Security Numbers.

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Top cyber security specialists, Cyber Experts.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Billing and delivery addresses, Personal Information, Social Security Numbers, Email and phone numbers, Order information and Last four digits of credit cards.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.0M.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Customers are advised to monitor their bank accounts for unusual activity..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Attorney General.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Comprehensive and methodical examination carried out.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Sprinter warns clients to be on the lookout for abnormal bank account activity.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=jd-sports-fashion-plc' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge