Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: Testing

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
DotNetSdk.csproj 02
Microsoft.AspNetCore.App:2.2.8cpe:2.3:a:app_project:app:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:asp-project:asp-project:2.2.8:*:*:*:*:*:*:*
pkg:nuget/Microsoft.AspNetCore.App@2.2.8HIGH1Low8
Microsoft.AspNetCore.Http.Extensions:2.2.0cpe:2.3:a:asp-project:asp-project:2.2.0:*:*:*:*:*:*:*pkg:nuget/Microsoft.AspNetCore.Http.Extensions@2.2.0 0Low8
Microsoft.AspNetCore.Http:2.2.2cpe:2.3:a:asp-project:asp-project:2.2.2:*:*:*:*:*:*:*pkg:nuget/Microsoft.AspNetCore.Http@2.2.2MEDIUM1Low8
Microsoft.Extensions.Hosting:9.0.0pkg:nuget/Microsoft.Extensions.Hosting@9.0.0 08
Newtonsoft.Json:13.0.3pkg:nuget/Newtonsoft.Json@13.0.3 07
SDKTest.csproj 02

Dependencies (vulnerable)

DotNetSdk.csproj

File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj
MD5: 075e4d7953a32a819509804ffdecad50
SHA1: 36935ebd6143dc18f55a0158f1875e640e5489d5
SHA256:e64829e9dd99697135021b44fb719347f778a2f5776394ee10ba2e6a8583c7f4

Identifiers

  • None

Microsoft.AspNetCore.App:2.2.8

File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj

Identifiers

  • pkg:nuget/Microsoft.AspNetCore.App@2.2.8  (Confidence:Highest)
  • cpe:2.3:a:app_project:app:2.2.8:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:asp-project:asp-project:2.2.8:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2020-1108 (OSSINDEX)  

A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.
CWE-noinfo

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:Microsoft.AspNetCore.App:2.2.8:*:*:*:*:*:*:*

Microsoft.AspNetCore.Http.Extensions:2.2.0

File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj

Identifiers

Microsoft.AspNetCore.Http:2.2.2

File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj

Identifiers

CVE-2020-1045 (OSSINDEX)  

<p>A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names.</p>
<p>The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encoded.</p>
<p>The security update addresses the vulnerability by fixing the way the ASP.NET Core cookie parser handles encoded names.</p>


Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2020-1045 for details
CWE-noinfo

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:Microsoft.AspNetCore.Http:2.2.2:*:*:*:*:*:*:*

Microsoft.Extensions.Hosting:9.0.0

File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj

Identifiers

Newtonsoft.Json:13.0.3

File Path: D:\Auropayrepos\AuropayDotnetSDK\SDKCode\DotNetSdk.csproj

Identifiers

SDKTest.csproj

File Path: D:\Auropayrepos\AuropayDotnetSDK\SampleAppCode\SDKTest.csproj
MD5: 2fcbbeebaf521f56f5dbe9a3239599d9
SHA1: eacd7fc34a7d356a6e6f78260e689a5263572eee
SHA256:2358c81c1e3ff944e354d5b3ec343a5e1fb8ef6a6f7873510f44236244d8a8d0

Identifiers

  • None


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.