Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
| Dependency | Vulnerability IDs | Package | Highest Severity | CVE Count | Confidence | Evidence Count |
|---|---|---|---|---|---|---|
| DotNetSdk.csproj | 0 | 2 | ||||
| Microsoft.AspNetCore.App:2.2.8 | cpe:2.3:a:app_project:app:2.2.8:*:*:*:*:*:*:* cpe:2.3:a:asp-project:asp-project:2.2.8:*:*:*:*:*:*:* | pkg:nuget/Microsoft.AspNetCore.App@2.2.8 | HIGH | 1 | Low | 8 |
| Microsoft.AspNetCore.Http.Extensions:2.2.0 | cpe:2.3:a:asp-project:asp-project:2.2.0:*:*:*:*:*:*:* | pkg:nuget/Microsoft.AspNetCore.Http.Extensions@2.2.0 | 0 | Low | 8 | |
| Microsoft.AspNetCore.Http:2.2.2 | cpe:2.3:a:asp-project:asp-project:2.2.2:*:*:*:*:*:*:* | pkg:nuget/Microsoft.AspNetCore.Http@2.2.2 | MEDIUM | 1 | Low | 8 |
| Microsoft.Extensions.Hosting:9.0.0 | pkg:nuget/Microsoft.Extensions.Hosting@9.0.0 | 0 | 8 | |||
| Newtonsoft.Json:13.0.3 | pkg:nuget/Newtonsoft.Json@13.0.3 | 0 | 7 | |||
| SDKTest.csproj | 0 | 2 |
File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj
MD5: 075e4d7953a32a819509804ffdecad50
SHA1: 36935ebd6143dc18f55a0158f1875e640e5489d5
SHA256:e64829e9dd99697135021b44fb719347f778a2f5776394ee10ba2e6a8583c7f4
File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj
CVE-2020-1108 (OSSINDEX)
A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.CWE-noinfo
Vulnerable Software & Versions (OSSINDEX):
File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj
File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj
CVE-2020-1045 (OSSINDEX)
<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p> <p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p> <p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p> Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2020-1045 for detailsCWE-noinfo
Vulnerable Software & Versions (OSSINDEX):
File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj
File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj
File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj
MD5: 2fcbbeebaf521f56f5dbe9a3239599d9
SHA1: eacd7fc34a7d356a6e6f78260e689a5263572eee
SHA256:2358c81c1e3ff944e354d5b3ec343a5e1fb8ef6a6f7873510f44236244d8a8d0