Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies;
false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and
the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties,
implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided
is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever
arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.
Scan Information (
show all ):
dependency-check version : 12.1.0Report Generated On : Tue, 4 Mar 2025 13:24:48 +0530Dependencies Scanned : 935 (354 unique)Vulnerable Dependencies : 16 Vulnerabilities Found : 164Vulnerabilities Suppressed : 0 ... NVD API Last Checked : 2025-03-04T10:03:23+0530NVD API Last Modified : 2025-03-04T04:15:15ZSummary Display:
Showing Vulnerable Dependencies (click to show all) .eslintrc.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\.eslintrc.jsMD5: 23d57c74621904a627062cf1e81894f7SHA1: d3f2ef224ef6a87840a046943ea40a92351069b0SHA256: 6b2b8b841373af965896bda684d5285e3e1e4d38eed40a796de227cdc7be06fd
Evidence Type Source Name Value Confidence
.eslintrc.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\.eslintrc.jsMD5: e546ced8387100f30125207b9f544205SHA1: 73d9d6152706d9bdc215593268075b5611a55f37SHA256: 7f43dfa73cc6993570ea09d565e5863dbb2d740a75e484e15f082561a0cbe8b4
Evidence Type Source Name Value Confidence
20200417143047_initial-fee.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200417143047_initial-fee.jsMD5: be7d78c4148ce1f9079dd937a7cf093aSHA1: 4adf459d9c1b9d7bba1c39084192027c57d2b598SHA256: 07d22be985dca8d29e940f7456b4ef9aef52c0e2759c1852e131d966dbe410f0
Evidence Type Source Name Value Confidence
20200420145657_initial-tax.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200420145657_initial-tax.jsMD5: 71177975709c04924a8e94f659efd280SHA1: 7eaa9a9f58e0e8bb7eb6af56117957df0fcf5c12SHA256: 0726dc8576c8390d9cfb76fd22f20d5937a5a5265b8e4b7ca54d8d644c2d26ec
Evidence Type Source Name Value Confidence
20200515105426_update-default-amount-column.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200515105426_update-default-amount-column.jsMD5: 7f7c62f1e8c28685ef3e8295a9b101abSHA1: 15d0568341094cf1576b5ad40d14235a7a0d42caSHA256: dab15d1b1418418988883f8c0405339b82e437f7a2616cf05957d9f4fadca0fe
Evidence Type Source Name Value Confidence
20201019191043_terms-and-conditions.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201019191043_terms-and-conditions.jsMD5: 0a0ea08bd79f96959a399cedcfa82cebSHA1: 76df3ccbe76c787ea22740b1034d11ecbe814308SHA256: fffe904a3bb76bf108fe9d76f050db95f1d21c0891c3280c88029afce6ac2d55
Evidence Type Source Name Value Confidence
20201105122857_accepted-terms.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201105122857_accepted-terms.jsMD5: f2a99f7533845a672588dc36540d7c40SHA1: 578b59da7f12bdd6996f00a1a07dcf7a7b7089b8SHA256: adb47b8e6c5126a1b85c75c4528b84fb5320217a3ae62332802fde2a7c802dc7
Evidence Type Source Name Value Confidence
20201109193632_update-termsandconditions-column-EffectiveFromDate-EffectiveToDate-dateTodatetime.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201109193632_update-termsandconditions-column-EffectiveFromDate-EffectiveToDate-dateTodatetime.jsMD5: 54755c710ccb7dfe2681b743b83e73f3SHA1: 953f7eec8cb4c2212900633144cc3aa8a5bc02e1SHA256: 7ee78959b3a7aae61f21bee4396654dcc742582abc1e996089cbc7764961f6f3
Evidence Type Source Name Value Confidence
20201111174715_add-termsandconditions-column-SubEntityId-SubEntityType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201111174715_add-termsandconditions-column-SubEntityId-SubEntityType.jsMD5: ef8d57141b3f603f7e01c19a6892dfd4SHA1: fa5d77bcc8629aedc6d993b41186c34ef5d5ce9dSHA256: 9d27c167eabe891335c2ea68a7fc6c4aba67ae319941688981806c9d0d492b3f
Evidence Type Source Name Value Confidence
20201118164959_termsandconditions-remove-column-MerchantId-PartnerId-add-column-ParentId.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201118164959_termsandconditions-remove-column-MerchantId-PartnerId-add-column-ParentId.jsMD5: a65f27b5812df00a7481825a0cfefa5fSHA1: 4d1718a5d47c6b4627c8d095bac91c3f9180c75eSHA256: 9d28948b54fe534bab9998504d64c4e1495c5b162e2e02dbff5fc75d52077947
Evidence Type Source Name Value Confidence
20201119111521_update-termsandconditions-and-acceptedterms-table.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119111521_update-termsandconditions-and-acceptedterms-table.jsMD5: 86896faad8a2b28416ecf0294261c039SHA1: 78314a95c3ac95a7d9f29ce3e0e05016660ca5ccSHA256: 185b53817cc092f58cd5e00ebb15bb9c8abcec0da336442f5a01cda2facd7069
Evidence Type Source Name Value Confidence
20201119122825_termsandconditions-removeColumn-SubEntityType-addTO-acceptedterms-table.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119122825_termsandconditions-removeColumn-SubEntityType-addTO-acceptedterms-table.jsMD5: 23ddf4d952ece266915e1d48628aa538SHA1: 39238d57a852bed9ef2cf2367782a3c59f4f8317SHA256: 67af1f4a067227bcedaacbf6c4212fc7be1162850524c570956e7b9c5ae90c1e
Evidence Type Source Name Value Confidence
20201119135126_update-termsandconditions-column-EntityTypeToConfigurerType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119135126_update-termsandconditions-column-EntityTypeToConfigurerType.jsMD5: a5586e7c9333c290e27f05f0c22f44baSHA1: 88b674361f23a7d0e92f598ee97149e08fda0b0fSHA256: fedcb6a031b21fc73c36735e26e195368a91c9dc94a1e34e7a1ffef297a4676c
Evidence Type Source Name Value Confidence
20201119135243_add-userType-parentId-Column-in-acceptTerms.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119135243_add-userType-parentId-Column-in-acceptTerms.jsMD5: 441000fb8e642bb56fb91b6601025874SHA1: 25044af0e557d5a9cc20ac298a07e011f665b401SHA256: f02b104c6e5c87ac45e95cca89ab96e115ac7a1ee1f7fce90755077ae75e046d
Evidence Type Source Name Value Confidence
20201119190055_acceptedterms-remove-column-MerchantId-PartnerId.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119190055_acceptedterms-remove-column-MerchantId-PartnerId.jsMD5: 65f554ee36b4d44fe2261913bc9e0df0SHA1: c27ce64d6947e6b393493c0f5841413f44855244SHA256: c77d7d216e6635c3d026057ee3453a7077b92379efb063db4e52756ba3fd73a7
Evidence Type Source Name Value Confidence
20201206230212_add-column-Browser-acceptedterms.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201206230212_add-column-Browser-acceptedterms.jsMD5: 71f624c0694e9ca1cd4829cb76a8d8e7SHA1: 46f32d704666ef461fb52d2e59d6a23941c2e75bSHA256: a3391abb852151bdf75e6bac36f4b20fbcc973f8c5652fb4e8aec8dc0ec9572e
Evidence Type Source Name Value Confidence
20201209154021_add-new-columns-in-acceptedTerms.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201209154021_add-new-columns-in-acceptedTerms.jsMD5: aa998adc7c90fd7e2e16d954bd97d630SHA1: e4e3f3c14939e838d9254c12bae98c69f5a2f2baSHA256: 4b92a22aed9b39422a546376a840be2a2fce8690be31b4412ec58311cf67723b
Evidence Type Source Name Value Confidence
20210211150909_add-column-EntityVersion-in-acceptedterms-table.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210211150909_add-column-EntityVersion-in-acceptedterms-table.jsMD5: 21d11a3ae6be0be7bfde3c5fdf55907dSHA1: c5c2fa8fe1c86faa92d1f68f27cd9b3dd279f2abSHA256: 9e9667dde204f9f713775d3d610f590bc715b9fe9adabd291a41482e38048ebd
Evidence Type Source Name Value Confidence
20210330095707_add-tax-on-fees.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210330095707_add-tax-on-fees.jsMD5: 8b40ac434eb5e681b7c16036e9a7f505SHA1: 6dee606fd85fd57381646c41d9f3a847e360c192SHA256: 42e1aaa286ff761f8a27db833ab21e88acaa26a54d7dbf1dfb05722087b7efeb
Evidence Type Source Name Value Confidence
20210408232444_url-shortener.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210408232444_url-shortener.jsMD5: 26dad0197b24ad39c914ce7450582d76SHA1: 7be820618d950c6e2f54e757c9742ca99d87197eSHA256: b777c509c2845846a94507033f874b24bbed8576e9f4cb59af37825c942ba41b
Evidence Type Source Name Value Confidence
20210421174340_change-url-datatype.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210421174340_change-url-datatype.jsMD5: 69b05e21ce9cb591b64b53f9e799945fSHA1: a41e1a9cf39360ad7502c8f26458395bceb3a4d3SHA256: e916d56a31e56dfb3fe9795365b050915b66f552e3fafa8df99a66e5018ae8a7
Evidence Type Source Name Value Confidence
20210421181819_change-length-fees-taxes.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210421181819_change-length-fees-taxes.jsMD5: ccfc41e8f536b1d727ef9cb62a7afcaeSHA1: b94d9011abf27e562ae1e6b3b1eafd587a650adaSHA256: 62cd204a3931b3b2117016178baf59b2f858190ff01ae9e8982c8a2916bb378c
Evidence Type Source Name Value Confidence
APF.Core3.1.API:6.0.0.*File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id APF Medium Vendor msbuild id APF.Core3.1.API Medium Vendor msbuild id Core3 Low Vendor msbuild id Core3.1.API Low Product msbuild id APF.Core3.1.API Highest Product msbuild id Core3 Medium Product msbuild id Core3.1.API Medium Version msbuild version 6.0.0.* Highest
APF.Core3.1.AWS:6.0.0.*File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id APF Medium Vendor msbuild id APF.Core3.1.AWS Medium Vendor msbuild id Core3 Low Vendor msbuild id Core3.1.AWS Low Product msbuild id APF.Core3.1.AWS Highest Product msbuild id Core3 Medium Product msbuild id Core3.1.AWS Medium Version msbuild version 6.0.0.* Highest
Related Dependencies APF.Core3.1.AWS:6.0.0.*File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/APF.Core3.1.AWS@6.0.0.%2A APF.Core3.1:6.0.0.12File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id APF Medium Vendor msbuild id APF.Core3.1 Medium Vendor msbuild id Core3 Low Vendor msbuild id Core3.1 Low Product msbuild id APF.Core3.1 Highest Product msbuild id Core3 Medium Product msbuild id Core3.1 Medium Version msbuild version 6.0.0.12 Highest
Related Dependencies APF.Core3.1:6.0.0.12File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/APF.Core3.1@6.0.0.12 APF.Core3.1:6.0.0.12File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj pkg:nuget/APF.Core3.1@6.0.0.12 AWSSDK.CloudWatch.dllDescription:
AWSSDK.CloudWatch
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch. Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, and set alarms. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatch.dllMD5: 9d23346785b3396e8b59177713590423SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03SHA256: 6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.CloudWatch High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.CloudWatch Low Vendor grokassembly InternalName AWSSDK.CloudWatch.dll Low Vendor grokassembly OriginalFilename AWSSDK.CloudWatch.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.CloudWatch High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.CloudWatch High Product grokassembly InternalName AWSSDK.CloudWatch.dll Medium Product grokassembly OriginalFilename AWSSDK.CloudWatch.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.2.10 High
Related Dependencies AWSSDK.CloudWatch.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.CloudWatch.dll MD5: 9d23346785b3396e8b59177713590423 SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03 SHA256: 6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24 AWSSDK.CloudWatch.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.CloudWatch.dll MD5: 9d23346785b3396e8b59177713590423 SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03 SHA256: 6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24 AWSSDK.CloudWatch.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.CloudWatch.dll MD5: 9d23346785b3396e8b59177713590423 SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03 SHA256: 6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24 AWSSDK.CloudWatch.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.CloudWatch.dll MD5: 9d23346785b3396e8b59177713590423 SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03 SHA256: 6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24 AWSSDK.CloudWatchEvents.dllDescription:
AWSSDK.CloudWatchEvents
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch Events. Amazon CloudWatch Events helps you to respond to state changes in your AWS resources. When your resources change state they automatically send events into an event stream. You can create rules that match selected events in the stream and route them to targets to take action. You can also use rules to take action on a pre-determined schedule. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dllMD5: 6b1541f7461a9a513a718285e86d42acSHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57dbSHA256: 331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.CloudWatchEvents High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.CloudWatchEvents Low Vendor grokassembly InternalName AWSSDK.CloudWatchEvents.dll Low Vendor grokassembly OriginalFilename AWSSDK.CloudWatchEvents.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.CloudWatchEvents High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.CloudWatchEvents High Product grokassembly InternalName AWSSDK.CloudWatchEvents.dll Medium Product grokassembly OriginalFilename AWSSDK.CloudWatchEvents.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.3.21 High
Related Dependencies AWSSDK.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dll MD5: 6b1541f7461a9a513a718285e86d42ac SHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57db SHA256: 331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b AWSSDK.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dll MD5: 6b1541f7461a9a513a718285e86d42ac SHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57db SHA256: 331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b AWSSDK.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dll MD5: 6b1541f7461a9a513a718285e86d42ac SHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57db SHA256: 331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b AWSSDK.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dll MD5: 6b1541f7461a9a513a718285e86d42ac SHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57db SHA256: 331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b AWSSDK.CloudWatchLogs.dllDescription:
AWSSDK.CloudWatchLogs
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch Logs. Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, and set alarms. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dllMD5: c2d546dcd8bb37c54e2bfe6362bc2ac9SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04fSHA256: b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.CloudWatchLogs High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.CloudWatchLogs Low Vendor grokassembly InternalName AWSSDK.CloudWatchLogs.dll Low Vendor grokassembly OriginalFilename AWSSDK.CloudWatchLogs.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.CloudWatchLogs High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.CloudWatchLogs High Product grokassembly InternalName AWSSDK.CloudWatchLogs.dll Medium Product grokassembly OriginalFilename AWSSDK.CloudWatchLogs.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.1.29 High
Related Dependencies AWSSDK.CloudWatchLogs.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dll MD5: c2d546dcd8bb37c54e2bfe6362bc2ac9 SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04f SHA256: b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24 AWSSDK.CloudWatchLogs.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dll MD5: c2d546dcd8bb37c54e2bfe6362bc2ac9 SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04f SHA256: b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24 AWSSDK.CloudWatchLogs.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dll MD5: c2d546dcd8bb37c54e2bfe6362bc2ac9 SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04f SHA256: b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24 AWSSDK.CloudWatchLogs.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dll MD5: c2d546dcd8bb37c54e2bfe6362bc2ac9 SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04f SHA256: b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24 AWSSDK.CognitoIdentity.dllDescription:
AWSSDK.CognitoIdentity
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Cognito Identity. Amazon Cognito is a service that makes it easy to save user data, such as app preferences or game state, in the AWS Cloud without writing any backend code or managing any infrastructure. With Amazon Cognito, you can focus on creating great app experiences instead of having to worry about building and managing a backend solution to handle identity management, network state, storage, and sync. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dllMD5: 077d87642ad4a529f29c588103e1e9e9SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222SHA256: 245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.CognitoIdentity High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.CognitoIdentity Low Vendor grokassembly InternalName AWSSDK.CognitoIdentity.dll Low Vendor grokassembly OriginalFilename AWSSDK.CognitoIdentity.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.CognitoIdentity High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.CognitoIdentity High Product grokassembly InternalName AWSSDK.CognitoIdentity.dll Medium Product grokassembly OriginalFilename AWSSDK.CognitoIdentity.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.0.2 High
Related Dependencies AWSSDK.CognitoIdentity.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dll MD5: 077d87642ad4a529f29c588103e1e9e9 SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222 SHA256: 245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26 AWSSDK.CognitoIdentity.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dll MD5: 077d87642ad4a529f29c588103e1e9e9 SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222 SHA256: 245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26 AWSSDK.CognitoIdentity.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dll MD5: 077d87642ad4a529f29c588103e1e9e9 SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222 SHA256: 245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26 AWSSDK.CognitoIdentity.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dll MD5: 077d87642ad4a529f29c588103e1e9e9 SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222 SHA256: 245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26 AWSSDK.CognitoIdentityProvider.dllDescription:
AWSSDK.CognitoIdentityProvider
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Cognito Identity Provider. You can create a user pool in Amazon Cognito Identity to manage directories and users. You can authenticate a user to obtain tokens related to user identity and access policies. This API reference provides information about user pools in Amazon Cognito Identity, which is a new capability that is available as a beta. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dllMD5: e6a430a806b6c5c99263721a969311bbSHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04cSHA256: 97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.CognitoIdentityProvider High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.CognitoIdentityProvider Low Vendor grokassembly InternalName AWSSDK.CognitoIdentityProvider.dll Low Vendor grokassembly OriginalFilename AWSSDK.CognitoIdentityProvider.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.CognitoIdentityProvider High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.CognitoIdentityProvider High Product grokassembly InternalName AWSSDK.CognitoIdentityProvider.dll Medium Product grokassembly OriginalFilename AWSSDK.CognitoIdentityProvider.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.1.26 High
Related Dependencies AWSSDK.CognitoIdentityProvider.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dll MD5: e6a430a806b6c5c99263721a969311bb SHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04c SHA256: 97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d AWSSDK.CognitoIdentityProvider.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dll MD5: e6a430a806b6c5c99263721a969311bb SHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04c SHA256: 97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d AWSSDK.CognitoIdentityProvider.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dll MD5: e6a430a806b6c5c99263721a969311bb SHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04c SHA256: 97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d AWSSDK.CognitoIdentityProvider.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dll MD5: e6a430a806b6c5c99263721a969311bb SHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04c SHA256: 97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d AWSSDK.Core.dllDescription:
AWSSDK.Core
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Core Runtime File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Core.dllMD5: 467e76b9d9380d31edfeaae7ad995e12SHA1: 8e71b48688d4ef0cd167702ca1c76ed557879520SHA256: cd39c7453bdb706e6389daa8b08f745f12c198f71184de0fe7d3347cd6f555ec
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon Highest Vendor file name AWSSDK.Core High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Core Low Vendor grokassembly InternalName AWSSDK.Core.dll Low Vendor grokassembly OriginalFilename AWSSDK.Core.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.Core Medium Vendor msbuild id Core Low Product dll namespace Amazon Highest Product file name AWSSDK.Core High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Core High Product grokassembly InternalName AWSSDK.Core.dll Medium Product grokassembly OriginalFilename AWSSDK.Core.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.Core Highest Product msbuild id Core Medium Version grokassembly FileVersion 3.7.100.22 High Version msbuild version 3.7.100.22 Highest
Related Dependencies AWSSDK.Core.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.Core.dll MD5: 467e76b9d9380d31edfeaae7ad995e12 SHA1: 8e71b48688d4ef0cd167702ca1c76ed557879520 SHA256: cd39c7453bdb706e6389daa8b08f745f12c198f71184de0fe7d3347cd6f555ec AWSSDK.Core.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.Core.dll MD5: 467e76b9d9380d31edfeaae7ad995e12 SHA1: 8e71b48688d4ef0cd167702ca1c76ed557879520 SHA256: cd39c7453bdb706e6389daa8b08f745f12c198f71184de0fe7d3347cd6f555ec AWSSDK.Core.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.Core.dll MD5: 467e76b9d9380d31edfeaae7ad995e12 SHA1: 8e71b48688d4ef0cd167702ca1c76ed557879520 SHA256: cd39c7453bdb706e6389daa8b08f745f12c198f71184de0fe7d3347cd6f555ec AWSSDK.Core:3.7.100.22File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/AWSSDK.Core@3.7.100.22 AWSSDK.Core:3.7.100.22File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.Core@3.7.100.22 AWSSDK.Core:3.7.100.22File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj pkg:nuget/AWSSDK.Core@3.7.100.22 AWSSDK.Core:3.7.100.22File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj pkg:nuget/AWSSDK.Core@3.7.100.22 AWSSDK.DynamoDBv2.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.DynamoDBv2.dll MD5: 1bd7ce442ee5f898b989219475a6daec SHA1: 8652a2ff3c81d3de958c7f9ed5a04c478a85ef26 SHA256: fae43bdbf04618f5565411c01f87dc581db2f61ae8fd707334240c70c243940f pkg:generic/AWSSDK.DynamoDBv2@3.7.100.22 AWSSDK.DynamoDBv2.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.DynamoDBv2.dll MD5: 1bd7ce442ee5f898b989219475a6daec SHA1: 8652a2ff3c81d3de958c7f9ed5a04c478a85ef26 SHA256: fae43bdbf04618f5565411c01f87dc581db2f61ae8fd707334240c70c243940f AWSSDK.DynamoDBv2.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.DynamoDBv2.dll MD5: 1bd7ce442ee5f898b989219475a6daec SHA1: 8652a2ff3c81d3de958c7f9ed5a04c478a85ef26 SHA256: fae43bdbf04618f5565411c01f87dc581db2f61ae8fd707334240c70c243940f AWSSDK.DynamoDBv2:3.7.100.22File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.DynamoDBv2@3.7.100.22 AWSSDK.DynamoDBv2:3.7.100.22File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj pkg:nuget/AWSSDK.DynamoDBv2@3.7.100.22 AWSSDK.Core.dllDescription:
AWSSDK.Core
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Core Runtime File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.Core.dllMD5: 9629a129a165ca4020f88a5d0a1986d2SHA1: 40ccf9fccf91aff983d87474df954ca0126a8332SHA256: 6c8ff7b2d3ec3b0e4e573ffe84b8a8a617b9157b9e9e3d55870967c205e9b286
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon Highest Vendor file name AWSSDK.Core High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Core Low Vendor grokassembly InternalName AWSSDK.Core.dll Low Vendor grokassembly OriginalFilename AWSSDK.Core.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product dll namespace Amazon Highest Product file name AWSSDK.Core High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Core High Product grokassembly InternalName AWSSDK.Core.dll Medium Product grokassembly OriginalFilename AWSSDK.Core.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.12.7 High
AWSSDK.Extensions.NETCore.Setup.dllDescription:
AWSSDK.Extensions.NETCore.Setup
Amazon Web Services SDK for .NET extensions for .NET Core setup File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dllMD5: 16c4d2168143c1802bd5f0e22a6a6e77SHA1: 4f2dd534473e60396793e3daf8e7d2c78c9749a7SHA256: de842a88c3aef72b4b5c916dee93f367226d5587d8ea929ccfb083919395ba6b
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.Extensions.NETCore.Setup High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Extensions.NETCore.Setup Low Vendor grokassembly InternalName AWSSDK.Extensions.NETCore.Setup.dll Low Vendor grokassembly OriginalFilename AWSSDK.Extensions.NETCore.Setup.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET extensions for .NET Core setup Medium Product file name AWSSDK.Extensions.NETCore.Setup High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Extensions.NETCore.Setup High Product grokassembly InternalName AWSSDK.Extensions.NETCore.Setup.dll Medium Product grokassembly OriginalFilename AWSSDK.Extensions.NETCore.Setup.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET extensions for .NET Core setup Highest Version grokassembly FileVersion 3.7.1 High
AWSSDK.Extensions.NETCore.Setup.dllDescription:
AWSSDK.Extensions.NETCore.Setup
Amazon Web Services SDK for .NET extensions for .NET Core setup File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dllMD5: ba4e1f512dc604aa5acb619e21a85e33SHA1: 1559609f307e078da77a8707475ce211700f78bdSHA256: 0faedb59d138a58703944a4a2fc7455d0b4b23cbe53c5087e1fe634b6757a8c1
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.Extensions.NETCore.Setup High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Extensions.NETCore.Setup Low Vendor grokassembly InternalName AWSSDK.Extensions.NETCore.Setup.dll Low Vendor grokassembly OriginalFilename AWSSDK.Extensions.NETCore.Setup.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET extensions for .NET Core setup Medium Product file name AWSSDK.Extensions.NETCore.Setup High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Extensions.NETCore.Setup High Product grokassembly InternalName AWSSDK.Extensions.NETCore.Setup.dll Medium Product grokassembly OriginalFilename AWSSDK.Extensions.NETCore.Setup.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET extensions for .NET Core setup Highest Version grokassembly FileVersion 3.3.100.0 High
Related Dependencies AWSSDK.Extensions.NETCore.Setup.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dll MD5: ba4e1f512dc604aa5acb619e21a85e33 SHA1: 1559609f307e078da77a8707475ce211700f78bd SHA256: 0faedb59d138a58703944a4a2fc7455d0b4b23cbe53c5087e1fe634b6757a8c1 AWSSDK.Extensions.NETCore.Setup.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dll MD5: ba4e1f512dc604aa5acb619e21a85e33 SHA1: 1559609f307e078da77a8707475ce211700f78bd SHA256: 0faedb59d138a58703944a4a2fc7455d0b4b23cbe53c5087e1fe634b6757a8c1 AWSSDK.Extensions.NETCore.Setup.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dll MD5: ba4e1f512dc604aa5acb619e21a85e33 SHA1: 1559609f307e078da77a8707475ce211700f78bd SHA256: 0faedb59d138a58703944a4a2fc7455d0b4b23cbe53c5087e1fe634b6757a8c1 AWSSDK.Extensions.NETCore.Setup:3.7.2File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.Extensions.NETCore.Setup Medium Vendor msbuild id Extensions Low Vendor msbuild id Extensions.NETCore.Setup Low Product msbuild id AWSSDK.Extensions.NETCore.Setup Highest Product msbuild id Extensions Medium Product msbuild id Extensions.NETCore.Setup Medium Version msbuild version 3.7.2 Highest
AWSSDK.KeyManagementService.dllDescription:
AWSSDK.KeyManagementService
The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Key Management Service. AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.KeyManagementService.dllMD5: a1b05ac0406fb1a3ca086d90d74f6e99SHA1: e1bebc738e77afd79877f9a014b1d3f673aa91bbSHA256: 64f4688ffddcd5f3bb01b54ba93b053c2c4d8e5075ab268ef89b3b7f7b5ef888
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.KeyManagementService High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.KeyManagementService Low Vendor grokassembly InternalName AWSSDK.KeyManagementService.dll Low Vendor grokassembly OriginalFilename AWSSDK.KeyManagementService.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.KeyManagementService Medium Vendor msbuild id KeyManagementService Low Product file name AWSSDK.KeyManagementService High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.KeyManagementService High Product grokassembly InternalName AWSSDK.KeyManagementService.dll Medium Product grokassembly OriginalFilename AWSSDK.KeyManagementService.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.KeyManagementService Highest Product msbuild id KeyManagementService Medium Version grokassembly FileVersion 3.7.100.22 High Version msbuild version 3.7.100.22 Highest
Related Dependencies AWSSDK.KeyManagementService.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.KeyManagementService.dll MD5: a1b05ac0406fb1a3ca086d90d74f6e99 SHA1: e1bebc738e77afd79877f9a014b1d3f673aa91bb SHA256: 64f4688ffddcd5f3bb01b54ba93b053c2c4d8e5075ab268ef89b3b7f7b5ef888 AWSSDK.KeyManagementService.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.KeyManagementService.dll MD5: a1b05ac0406fb1a3ca086d90d74f6e99 SHA1: e1bebc738e77afd79877f9a014b1d3f673aa91bb SHA256: 64f4688ffddcd5f3bb01b54ba93b053c2c4d8e5075ab268ef89b3b7f7b5ef888 AWSSDK.KeyManagementService:3.7.100.22File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.KeyManagementService@3.7.100.22 AWSSDK.SimpleNotificationService.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dll MD5: fa90ed8358c41d7b0fcd650300c3a8a4 SHA1: 9b7d673b452d94de061312bad144faaf5994dcc2 SHA256: 505980f15e6ba4d19f8f0d9a72702fc61b7362d67e960a26d2b61cd5439133dd pkg:generic/AWSSDK.SimpleNotificationService@3.7.100.22 AWSSDK.SimpleNotificationService.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dll MD5: fa90ed8358c41d7b0fcd650300c3a8a4 SHA1: 9b7d673b452d94de061312bad144faaf5994dcc2 SHA256: 505980f15e6ba4d19f8f0d9a72702fc61b7362d67e960a26d2b61cd5439133dd AWSSDK.SimpleNotificationService.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dll MD5: fa90ed8358c41d7b0fcd650300c3a8a4 SHA1: 9b7d673b452d94de061312bad144faaf5994dcc2 SHA256: 505980f15e6ba4d19f8f0d9a72702fc61b7362d67e960a26d2b61cd5439133dd AWSSDK.SimpleNotificationService:3.7.100.22File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.SimpleNotificationService@3.7.100.22 AWSSDK.Kinesis.dllDescription:
AWSSDK.Kinesis
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Kinesis. Amazon Kinesis is a fully managed, cloud-based service for real-time processing of large, distributed data streams. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Kinesis.dllMD5: 55f9c9dfc45d0c99d00df1fdb8906dbaSHA1: d9bec436c205666bafd3a83c564f44f1842c910dSHA256: 1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.Kinesis High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Kinesis Low Vendor grokassembly InternalName AWSSDK.Kinesis.dll Low Vendor grokassembly OriginalFilename AWSSDK.Kinesis.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.Kinesis High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Kinesis High Product grokassembly InternalName AWSSDK.Kinesis.dll Medium Product grokassembly OriginalFilename AWSSDK.Kinesis.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.0.0 High
Related Dependencies AWSSDK.DynamoDBv2.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.DynamoDBv2.dll MD5: 0bf4dad07e2acff38e7ff2e6fbbb95f3 SHA1: b05f934974c25b83c41061fd7297d0b3454dd670 SHA256: 30ac5348b1fd58314cac09259b1ee1b9d59df4815d73fab80c4e366005d9290a pkg:generic/AWSSDK.DynamoDBv2@3.7.0.0 AWSSDK.DynamoDBv2.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.DynamoDBv2.dll MD5: 0bf4dad07e2acff38e7ff2e6fbbb95f3 SHA1: b05f934974c25b83c41061fd7297d0b3454dd670 SHA256: 30ac5348b1fd58314cac09259b1ee1b9d59df4815d73fab80c4e366005d9290a AWSSDK.Kinesis.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.Kinesis.dll MD5: 55f9c9dfc45d0c99d00df1fdb8906dba SHA1: d9bec436c205666bafd3a83c564f44f1842c910d SHA256: 1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437 AWSSDK.Kinesis.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.Kinesis.dll MD5: 55f9c9dfc45d0c99d00df1fdb8906dba SHA1: d9bec436c205666bafd3a83c564f44f1842c910d SHA256: 1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437 AWSSDK.Kinesis.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.Kinesis.dll MD5: 55f9c9dfc45d0c99d00df1fdb8906dba SHA1: d9bec436c205666bafd3a83c564f44f1842c910d SHA256: 1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437 AWSSDK.Kinesis.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.Kinesis.dll MD5: 55f9c9dfc45d0c99d00df1fdb8906dba SHA1: d9bec436c205666bafd3a83c564f44f1842c910d SHA256: 1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437 AWSSDK.Lambda.dllDescription:
AWSSDK.Lambda
The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Lambda. AWS Lambda is a compute service that runs your code in response to events and automatically manages the compute resources for you, making it easy to build applications that respond quickly to new information. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Lambda.dllMD5: 565fb50b03e9ced659b44217eaf7f21dSHA1: b82678f45e7dcfef8c05d9a2bc635c29b83d9916SHA256: 9475044bf55b6aaa7d3da7e817ef0f119322d0633169f10040421ae40c9742b0
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.Lambda High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Lambda Low Vendor grokassembly InternalName AWSSDK.Lambda.dll Low Vendor grokassembly OriginalFilename AWSSDK.Lambda.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.Lambda Medium Vendor msbuild id Lambda Low Product file name AWSSDK.Lambda High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Lambda High Product grokassembly InternalName AWSSDK.Lambda.dll Medium Product grokassembly OriginalFilename AWSSDK.Lambda.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.Lambda Highest Product msbuild id Lambda Medium Version grokassembly FileVersion 3.7.101.2 High Version msbuild version 3.7.101.2 Highest
Related Dependencies AWSSDK.Lambda.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.Lambda.dll MD5: 565fb50b03e9ced659b44217eaf7f21d SHA1: b82678f45e7dcfef8c05d9a2bc635c29b83d9916 SHA256: 9475044bf55b6aaa7d3da7e817ef0f119322d0633169f10040421ae40c9742b0 AWSSDK.Lambda.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.Lambda.dll MD5: 565fb50b03e9ced659b44217eaf7f21d SHA1: b82678f45e7dcfef8c05d9a2bc635c29b83d9916 SHA256: 9475044bf55b6aaa7d3da7e817ef0f119322d0633169f10040421ae40c9742b0 AWSSDK.Lambda:3.7.101.2File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.Lambda@3.7.101.2 AWSSDK.Lambda.dllDescription:
AWSSDK.Lambda
The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Lambda. AWS Lambda is a compute service that runs your code in response to events and automatically manages the compute resources for you, making it easy to build applications that respond quickly to new information. File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.Lambda.dllMD5: 8e9fdd824d660ddf700c1616b4211ecbSHA1: f68793ff15c1451a6fa7ae9866d9e41eea9daa95SHA256: 57010c8613942e972f5443b8247db47ef68239404626ec8354ac4630f9ea65fc
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.Lambda High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.Lambda Low Vendor grokassembly InternalName AWSSDK.Lambda.dll Low Vendor grokassembly OriginalFilename AWSSDK.Lambda.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.Lambda High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.Lambda High Product grokassembly InternalName AWSSDK.Lambda.dll Medium Product grokassembly OriginalFilename AWSSDK.Lambda.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.3.3 High
Related Dependencies AWSSDK.Lambda.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.Lambda.dll MD5: 8e9fdd824d660ddf700c1616b4211ecb SHA1: f68793ff15c1451a6fa7ae9866d9e41eea9daa95 SHA256: 57010c8613942e972f5443b8247db47ef68239404626ec8354ac4630f9ea65fc AWSSDK.RDS.dllDescription:
AWSSDK.RDS
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Relational Database Service. Amazon Relational Database Service (Amazon RDS) is a web service that makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while managing time-consuming database management tasks, freeing you up to focus on your applications and business. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.RDS.dllMD5: 39b016f734436e0ce6e04f8deec3d91eSHA1: f6a1c5b907fdfaa29114f5e2ee470cfe42c9968bSHA256: 3bed76b016236dca68609aa36434f7f81ec3d402b0408347dc81dadcafb7b839
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.RDS High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.RDS Low Vendor grokassembly InternalName AWSSDK.RDS.dll Low Vendor grokassembly OriginalFilename AWSSDK.RDS.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.RDS Medium Vendor msbuild id RDS Low Product file name AWSSDK.RDS High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.RDS High Product grokassembly InternalName AWSSDK.RDS.dll Medium Product grokassembly OriginalFilename AWSSDK.RDS.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.RDS Highest Product msbuild id RDS Medium Version grokassembly FileVersion 3.7.104.3 High Version msbuild version 3.7.104.3 Highest
Related Dependencies AWSSDK.RDS:3.7.104.3File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/AWSSDK.RDS@3.7.104.3 AWSSDK.RDS.dllDescription:
AWSSDK.RDS
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Relational Database Service. Amazon Relational Database Service (Amazon RDS) is a web service that makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while managing time-consuming database management tasks, freeing you up to focus on your applications and business. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.RDS.dllMD5: fdeef7a8653996d212707d196da0297cSHA1: 8d32a9b416563cfba1d90f49b7eb3d4d060f978dSHA256: a1e0ead59da7a9400545f6f2a7dfcfb9c94837cd73269692be2d0c11b1dbb2a1
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.RDS High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.RDS Low Vendor grokassembly InternalName AWSSDK.RDS.dll Low Vendor grokassembly OriginalFilename AWSSDK.RDS.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.RDS Medium Vendor msbuild id RDS Low Product file name AWSSDK.RDS High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.RDS High Product grokassembly InternalName AWSSDK.RDS.dll Medium Product grokassembly OriginalFilename AWSSDK.RDS.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.RDS Highest Product msbuild id RDS Medium Version grokassembly FileVersion 3.7.103.1 High Version msbuild version 3.7.103.1 Highest
Related Dependencies AWSSDK.RDS.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.RDS.dll MD5: fdeef7a8653996d212707d196da0297c SHA1: 8d32a9b416563cfba1d90f49b7eb3d4d060f978d SHA256: a1e0ead59da7a9400545f6f2a7dfcfb9c94837cd73269692be2d0c11b1dbb2a1 AWSSDK.RDS:3.7.103.1File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.RDS@3.7.103.1 AWSSDK.S3.dllDescription:
AWSSDK.S3
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Storage Service. Amazon Simple Storage Service (Amazon S3), provides developers and IT teams with secure, durable, highly-scalable object storage. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.S3.dllMD5: e353b098e61f99dc5ad9deb64979b086SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221bSHA256: 5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon Highest Vendor file name AWSSDK.S3 High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.S3 Low Vendor grokassembly InternalName AWSSDK.S3.dll Low Vendor grokassembly OriginalFilename AWSSDK.S3.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.S3 Medium Vendor msbuild id S3 Low Product dll namespace Amazon Highest Product file name AWSSDK.S3 High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.S3 High Product grokassembly InternalName AWSSDK.S3.dll Medium Product grokassembly OriginalFilename AWSSDK.S3.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.S3 Highest Product msbuild id S3 Medium Version grokassembly FileVersion 3.7.9.23 High Version msbuild version 3.7.9.23 Highest
Related Dependencies AWSSDK.S3.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.S3.dll MD5: e353b098e61f99dc5ad9deb64979b086 SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221b SHA256: 5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1 AWSSDK.S3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.S3.dll MD5: e353b098e61f99dc5ad9deb64979b086 SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221b SHA256: 5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1 AWSSDK.S3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.S3.dll MD5: e353b098e61f99dc5ad9deb64979b086 SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221b SHA256: 5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1 AWSSDK.S3.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.S3.dll MD5: e353b098e61f99dc5ad9deb64979b086 SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221b SHA256: 5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1 AWSSDK.S3:3.7.9.23File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/AWSSDK.S3@3.7.9.23 AWSSDK.S3:3.7.9.23File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/AWSSDK.S3@3.7.9.23 AWSSDK.S3:3.7.9.23File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.S3@3.7.9.23 AWSSDK.SQS.dllDescription:
AWSSDK.SQS
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Queue Service. Amazon Simple Queue Service (SQS) is a fast, reliable, scalable, fully managed message queuing service. SQS makes it simple and cost-effective to decouple the components of a cloud application. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SQS.dllMD5: b64058f765f446099bfafdd7de480b0bSHA1: 074f840c244bab2a2de9679c2c536bfd8b180cebSHA256: a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.SQS High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.SQS Low Vendor grokassembly InternalName AWSSDK.SQS.dll Low Vendor grokassembly OriginalFilename AWSSDK.SQS.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.SQS High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.SQS High Product grokassembly InternalName AWSSDK.SQS.dll Medium Product grokassembly OriginalFilename AWSSDK.SQS.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.0.55 High
Related Dependencies AWSSDK.SQS.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.SQS.dll MD5: b64058f765f446099bfafdd7de480b0b SHA1: 074f840c244bab2a2de9679c2c536bfd8b180ceb SHA256: a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4 AWSSDK.SQS.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SQS.dll MD5: b64058f765f446099bfafdd7de480b0b SHA1: 074f840c244bab2a2de9679c2c536bfd8b180ceb SHA256: a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4 AWSSDK.SQS.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.SQS.dll MD5: b64058f765f446099bfafdd7de480b0b SHA1: 074f840c244bab2a2de9679c2c536bfd8b180ceb SHA256: a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4 AWSSDK.SQS.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.SQS.dll MD5: b64058f765f446099bfafdd7de480b0b SHA1: 074f840c244bab2a2de9679c2c536bfd8b180ceb SHA256: a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4 AWSSDK.SecurityToken.dllDescription:
AWSSDK.SecurityToken
The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Security Token Service. The AWS Security Token Service (AWS STS) enables you to provide trusted users with temporary credentials that provide controlled access to your AWS resources. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SecurityToken.dllMD5: cc71468541154b15038c3cac1bbb3f23SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129SHA256: fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.SecurityToken High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.SecurityToken Low Vendor grokassembly InternalName AWSSDK.SecurityToken.dll Low Vendor grokassembly OriginalFilename AWSSDK.SecurityToken.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.SecurityToken High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.SecurityToken High Product grokassembly InternalName AWSSDK.SecurityToken.dll Medium Product grokassembly OriginalFilename AWSSDK.SecurityToken.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.0.2 High
Related Dependencies AWSSDK.SecurityToken.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.SecurityToken.dll MD5: cc71468541154b15038c3cac1bbb3f23 SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129 SHA256: fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b AWSSDK.SecurityToken.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SecurityToken.dll MD5: cc71468541154b15038c3cac1bbb3f23 SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129 SHA256: fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b AWSSDK.SecurityToken.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.SecurityToken.dll MD5: cc71468541154b15038c3cac1bbb3f23 SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129 SHA256: fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b AWSSDK.SecurityToken.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.SecurityToken.dll MD5: cc71468541154b15038c3cac1bbb3f23 SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129 SHA256: fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b AWSSDK.SimpleNotificationService.dllDescription:
AWSSDK.SimpleNotificationService
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Notification Service. Amazon Simple Notification Service (Amazon SNS) is a fast, flexible, fully managed push messaging service. Amazon SNS makes it simple and cost-effective to push notifications to Apple, Google, Fire OS, and Windows devices, as well as Android devices in China with Baidu Cloud Push. You can also use SNS to push notifications to internet connected smart devices, as well as other distributed services. File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dllMD5: 2a0aea99f4086fc30ca14f26c189b6fdSHA1: d01c20985248b70fbef818dbbfbfd9a6836f3c30SHA256: e5436663f4135f650f7a4663fac7626570c2f9be76f7a29474b8a4851705030a
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.SimpleNotificationService High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.SimpleNotificationService Low Vendor grokassembly InternalName AWSSDK.SimpleNotificationService.dll Low Vendor grokassembly OriginalFilename AWSSDK.SimpleNotificationService.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.SimpleNotificationService High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.SimpleNotificationService High Product grokassembly InternalName AWSSDK.SimpleNotificationService.dll Medium Product grokassembly OriginalFilename AWSSDK.SimpleNotificationService.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.2.25 High
Related Dependencies AWSSDK.SimpleNotificationService.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dll MD5: 2a0aea99f4086fc30ca14f26c189b6fd SHA1: d01c20985248b70fbef818dbbfbfd9a6836f3c30 SHA256: e5436663f4135f650f7a4663fac7626570c2f9be76f7a29474b8a4851705030a AWSSDK.SimpleSystemsManagement.dllDescription:
AWSSDK.SimpleSystemsManagement
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Systems Manager (SSM). Amazon EC2 Simple Systems Manager (SSM) enables you to manage a number of administrative and configuration tasks on your instances. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dllMD5: ef1896a30bd410629a4c3796000d4a24SHA1: 47987aaf60eef3520039aba68b84cc7f89dc1f6bSHA256: 04cb00a3c8aaeb5184a2963cc622a6a8a349d5d68111c6c71ee3cdc0c7f11b72
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.SimpleSystemsManagement High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.SimpleSystemsManagement Low Vendor grokassembly InternalName AWSSDK.SimpleSystemsManagement.dll Low Vendor grokassembly OriginalFilename AWSSDK.SimpleSystemsManagement.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Vendor msbuild id AWSSDK Medium Vendor msbuild id AWSSDK.SimpleSystemsManagement Medium Vendor msbuild id SimpleSystemsManagement Low Product file name AWSSDK.SimpleSystemsManagement High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.SimpleSystemsManagement High Product grokassembly InternalName AWSSDK.SimpleSystemsManagement.dll Medium Product grokassembly OriginalFilename AWSSDK.SimpleSystemsManagement.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Product msbuild id AWSSDK.SimpleSystemsManagement Highest Product msbuild id SimpleSystemsManagement Medium Version grokassembly FileVersion 3.7.20.6 High Version msbuild version 3.7.20.6 Highest
Related Dependencies AWSSDK.SimpleSystemsManagement.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dll MD5: ef1896a30bd410629a4c3796000d4a24 SHA1: 47987aaf60eef3520039aba68b84cc7f89dc1f6b SHA256: 04cb00a3c8aaeb5184a2963cc622a6a8a349d5d68111c6c71ee3cdc0c7f11b72 AWSSDK.SimpleSystemsManagement.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dll MD5: ef1896a30bd410629a4c3796000d4a24 SHA1: 47987aaf60eef3520039aba68b84cc7f89dc1f6b SHA256: 04cb00a3c8aaeb5184a2963cc622a6a8a349d5d68111c6c71ee3cdc0c7f11b72 AWSSDK.SimpleSystemsManagement:3.7.20.6File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/AWSSDK.SimpleSystemsManagement@3.7.20.6 AWSSDK.SimpleSystemsManagement.dllDescription:
AWSSDK.SimpleSystemsManagement
The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Systems Manager (SSM). Amazon EC2 Simple Systems Manager (SSM) enables you to manage a number of administrative and configuration tasks on your instances. File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dllMD5: 26fd7bd79d315ed267656b83e1974be2SHA1: c3a40d060ed4f71e3877e16190c483705ff471ccSHA256: 154cc873aa5a53b93a94cfd5cd1f7f594401e26a1d857cd6601ab30dd410c6ec
Evidence Type Source Name Value Confidence Vendor file name AWSSDK.SimpleSystemsManagement High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription AWSSDK.SimpleSystemsManagement Low Vendor grokassembly InternalName AWSSDK.SimpleSystemsManagement.dll Low Vendor grokassembly OriginalFilename AWSSDK.SimpleSystemsManagement.dll Low Vendor grokassembly ProductName Amazon Web Services SDK for .NET Medium Product file name AWSSDK.SimpleSystemsManagement High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription AWSSDK.SimpleSystemsManagement High Product grokassembly InternalName AWSSDK.SimpleSystemsManagement.dll Medium Product grokassembly OriginalFilename AWSSDK.SimpleSystemsManagement.dll Medium Product grokassembly ProductName Amazon Web Services SDK for .NET Highest Version grokassembly FileVersion 3.7.0.2 High
Related Dependencies AWSSDK.SimpleSystemsManagement.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dll MD5: 26fd7bd79d315ed267656b83e1974be2 SHA1: c3a40d060ed4f71e3877e16190c483705ff471cc SHA256: 154cc873aa5a53b93a94cfd5cd1f7f594401e26a1d857cd6601ab30dd410c6ec AcceptTermsCommunicationService.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\communication\termsAndConditions\AcceptTermsCommunicationService.jsMD5: a07c50c661f8ec44a741f3b6bdf1b1c9SHA1: 326e4e020e532baaaca55c3cc6c3f933fff5911fSHA256: 1079fbd329a3e2c60efd05c503edb295e4451d8fb4a689ff7e082e74009c9f6c
Evidence Type Source Name Value Confidence
AcceptTermsSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\AcceptTermsSchema.jsMD5: 1fbd49f0d65ce1e43de0ea0e8982f298SHA1: d7f09bd15e54c6f44eb9112252c2f9bd69100263SHA256: 96e7ab359419a3ed098532611f57ba72988b4a18bb1cec13d65e549e15d22dee
Evidence Type Source Name Value Confidence
AcceptedTermsAndConditionsListener.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\event\AcceptedTermsAndConditionsListener.jsMD5: 7433c44936eed5f08c50155837bfab6cSHA1: 43af96cf56eb7957f1b7e1283bcf08cf661d497dSHA256: 521e873e6f7b541b1aea4488469f226cc2a373c487f887c9fc11096af43dc5de
Evidence Type Source Name Value Confidence
AllowedProcessMethod.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\models\AllowedProcessMethod.jsMD5: c3c7c444b19697fd17c6ac0778027d71SHA1: 1c06e5c77c4a68b9aa53d5783d30ed628d1104a9SHA256: 6914165c03c84a93d5e2d8c6f80a1c640be0d885f3366b972b44c78f9e3b9c8b
Evidence Type Source Name Value Confidence
Amazon.AspNetCore.DataProtection.SSM.dllDescription:
Amazon.AspNetCore.DataProtection.SSM
AWS Systems Manager ASP.NET Core Data Protection Provider library allows you to use AWS Systems Manager's Parameter Store to store keys generated by ASP.NET's Data Protection API. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dllMD5: c68f7ef58793633aca20d5537f8556b6SHA1: c6aa5cd3d91a92375da190b38531c610577ace5eSHA256: 67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.AspNetCore.DataProtection.SSM Highest Vendor file name Amazon.AspNetCore.DataProtection.SSM High Vendor grokassembly CompanyName Amazon Web Services Highest Vendor grokassembly FileDescription Amazon.AspNetCore.DataProtection.SSM Low Vendor grokassembly InternalName Amazon.AspNetCore.DataProtection.SSM.dll Low Vendor grokassembly OriginalFilename Amazon.AspNetCore.DataProtection.SSM.dll Low Vendor grokassembly ProductName Amazon.AspNetCore.DataProtection.SSM Medium Product dll namespace Amazon.AspNetCore.DataProtection.SSM Highest Product file name Amazon.AspNetCore.DataProtection.SSM High Product grokassembly CompanyName Amazon Web Services Low Product grokassembly FileDescription Amazon.AspNetCore.DataProtection.SSM High Product grokassembly InternalName Amazon.AspNetCore.DataProtection.SSM.dll Medium Product grokassembly OriginalFilename Amazon.AspNetCore.DataProtection.SSM.dll Medium Product grokassembly ProductName Amazon.AspNetCore.DataProtection.SSM Highest Version AssemblyAnalyzer FilteredVersion 2.1.0 Highest Version grokassembly ProductVersion 2.1.0 Highest
Related Dependencies Amazon.AspNetCore.DataProtection.SSM.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dll MD5: c68f7ef58793633aca20d5537f8556b6 SHA1: c6aa5cd3d91a92375da190b38531c610577ace5e SHA256: 67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69 Amazon.AspNetCore.DataProtection.SSM.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dll MD5: c68f7ef58793633aca20d5537f8556b6 SHA1: c6aa5cd3d91a92375da190b38531c610577ace5e SHA256: 67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69 Amazon.AspNetCore.DataProtection.SSM.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dll MD5: c68f7ef58793633aca20d5537f8556b6 SHA1: c6aa5cd3d91a92375da190b38531c610577ace5e SHA256: 67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69 Amazon.AspNetCore.DataProtection.SSM.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dll MD5: c68f7ef58793633aca20d5537f8556b6 SHA1: c6aa5cd3d91a92375da190b38531c610577ace5e SHA256: 67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69 Amazon.Lambda.APIGatewayEvents.dllDescription:
Amazon.Lambda.APIGatewayEvents
Lambda event interfaces for API Gateway event source. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dllMD5: b6ca3641f0c25773bac593a06a0fb9e3SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161SHA256: 3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.APIGatewayEvents Highest Vendor file name Amazon.Lambda.APIGatewayEvents High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription Amazon.Lambda.APIGatewayEvents Low Vendor grokassembly InternalName Amazon.Lambda.APIGatewayEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.APIGatewayEvents.dll Low Vendor grokassembly ProductName Amazon Web Services Lambda Interface for .NET Medium Product dll namespace Amazon.Lambda.APIGatewayEvents Highest Product file name Amazon.Lambda.APIGatewayEvents High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription Amazon.Lambda.APIGatewayEvents High Product grokassembly InternalName Amazon.Lambda.APIGatewayEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.APIGatewayEvents.dll Medium Product grokassembly ProductName Amazon Web Services Lambda Interface for .NET Highest Version grokassembly FileVersion 1.2.0.0 High
Related Dependencies Amazon.Lambda.APIGatewayEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dll MD5: b6ca3641f0c25773bac593a06a0fb9e3 SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161 SHA256: 3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234 Amazon.Lambda.APIGatewayEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dll MD5: b6ca3641f0c25773bac593a06a0fb9e3 SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161 SHA256: 3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234 Amazon.Lambda.APIGatewayEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dll MD5: b6ca3641f0c25773bac593a06a0fb9e3 SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161 SHA256: 3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234 Amazon.Lambda.APIGatewayEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dll MD5: b6ca3641f0c25773bac593a06a0fb9e3 SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161 SHA256: 3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234 Amazon.Lambda.ApplicationLoadBalancerEvents.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.ApplicationLoadBalancerEvents.dllMD5: ae75d9f69d0372ed9f5670b7dda6d289SHA1: 577796cab594dc7e43ce3f7a0c3002d9017cf789SHA256: 92d056aee57a68fb73e5d4844d6b8a31b5b357a348ec8410530efe0f8925621f
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.ApplicationLoadBalancerEvents Highest Vendor file name Amazon.Lambda.ApplicationLoadBalancerEvents High Vendor grokassembly InternalName Amazon.Lambda.ApplicationLoadBalancerEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.ApplicationLoadBalancerEvents.dll Low Product dll namespace Amazon.Lambda.ApplicationLoadBalancerEvents Highest Product file name Amazon.Lambda.ApplicationLoadBalancerEvents High Product grokassembly InternalName Amazon.Lambda.ApplicationLoadBalancerEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.ApplicationLoadBalancerEvents.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Amazon.Lambda.AspNetCoreServer.dllDescription:
Amazon.Lambda.AspNetCoreServer
Amazon.Lambda.AspNetCoreServer makes it easy to run ASP.NET Core Web API applications as AWS Lambda functions. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.AspNetCoreServer.dllMD5: 1a98e64bd09cd446ffdf624e5a108e78SHA1: e69b02e55705f32e276c83d025532c9464417518SHA256: 844a98b87b1f9f21591a939f01bb0bd19a0d455c663c7266b0b9050f0994c66d
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.AspNetCoreServer Highest Vendor file name Amazon.Lambda.AspNetCoreServer High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription Amazon.Lambda.AspNetCoreServer Low Vendor grokassembly InternalName Amazon.Lambda.AspNetCoreServer.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.AspNetCoreServer.dll Low Vendor grokassembly ProductName Amazon Web Services Lambda Interface for .NET Medium Product dll namespace Amazon.Lambda.AspNetCoreServer Highest Product file name Amazon.Lambda.AspNetCoreServer High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription Amazon.Lambda.AspNetCoreServer High Product grokassembly InternalName Amazon.Lambda.AspNetCoreServer.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.AspNetCoreServer.dll Medium Product grokassembly ProductName Amazon Web Services Lambda Interface for .NET Highest Version grokassembly FileVersion 2.0.4 High
Amazon.Lambda.AspNetCoreServer:6.1.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Amazon Medium Vendor msbuild id Amazon.Lambda.AspNetCoreServer Medium Vendor msbuild id Lambda Low Vendor msbuild id Lambda.AspNetCoreServer Low Product msbuild id Amazon.Lambda.AspNetCoreServer Highest Product msbuild id Lambda Medium Product msbuild id Lambda.AspNetCoreServer Medium Version msbuild version 6.1.0 Highest
Amazon.Lambda.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dllMD5: 95bcaf057baddd5713bcc10d17a73d5dSHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7SHA256: 5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.CloudWatchEvents Highest Vendor file name Amazon.Lambda.CloudWatchEvents High Vendor grokassembly InternalName Amazon.Lambda.CloudWatchEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.CloudWatchEvents.dll Low Product dll namespace Amazon.Lambda.CloudWatchEvents Highest Product file name Amazon.Lambda.CloudWatchEvents High Product grokassembly InternalName Amazon.Lambda.CloudWatchEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.CloudWatchEvents.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Related Dependencies Amazon.Lambda.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dll MD5: 95bcaf057baddd5713bcc10d17a73d5d SHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7 SHA256: 5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77 Amazon.Lambda.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dll MD5: 95bcaf057baddd5713bcc10d17a73d5d SHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7 SHA256: 5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77 Amazon.Lambda.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dll MD5: 95bcaf057baddd5713bcc10d17a73d5d SHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7 SHA256: 5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77 Amazon.Lambda.CloudWatchEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dll MD5: 95bcaf057baddd5713bcc10d17a73d5d SHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7 SHA256: 5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77 Amazon.Lambda.Core.dllDescription:
Amazon.Lambda.Core
Core interfaces for Lambda. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Core.dllMD5: e3ff649709a36002a8caeba1c2b6a63cSHA1: 8a0d532bd5dd292dd8b5572c81a0af48a30cd5ceSHA256: d3fd1d761d03288299dfb5bc5fbb9650c360e815176828704ed683d056ffa249
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.Core Highest Vendor file name Amazon.Lambda.Core High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription Amazon.Lambda.Core Low Vendor grokassembly InternalName Amazon.Lambda.Core.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.Core.dll Low Vendor grokassembly ProductName Amazon Web Services Lambda Interface for .NET Medium Product dll namespace Amazon.Lambda.Core Highest Product file name Amazon.Lambda.Core High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription Amazon.Lambda.Core High Product grokassembly InternalName Amazon.Lambda.Core.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.Core.dll Medium Product grokassembly ProductName Amazon Web Services Lambda Interface for .NET Highest Version grokassembly FileVersion 1.0.0.0 High
Related Dependencies Amazon.Lambda.Core:2.1.0File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Amazon Medium Vendor msbuild id Amazon.Lambda.Core Medium Vendor msbuild id Lambda Low Vendor msbuild id Lambda.Core Low Product msbuild id Amazon.Lambda.Core Highest Product msbuild id Lambda Medium Product msbuild id Lambda.Core Medium Version msbuild version 2.1.0 Highest
Related Dependencies Amazon.Lambda.Core:2.1.0File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj pkg:nuget/Amazon.Lambda.Core@2.1.0 Amazon.Lambda.DynamoDBEvents:2.0.0File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Amazon Medium Vendor msbuild id Amazon.Lambda.DynamoDBEvents Medium Vendor msbuild id Lambda Low Vendor msbuild id Lambda.DynamoDBEvents Low Product msbuild id Amazon.Lambda.DynamoDBEvents Highest Product msbuild id Lambda Medium Product msbuild id Lambda.DynamoDBEvents Medium Version msbuild version 2.0.0 Highest
Related Dependencies Amazon.Lambda.DynamoDBEvents:2.0.0File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj pkg:nuget/Amazon.Lambda.DynamoDBEvents@2.0.0 Amazon.Lambda.KinesisAnalyticsEvents.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dllMD5: 8f07da2c44d07e00ffd18617185a44a6SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999aSHA256: 239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.KinesisAnalyticsEvents Highest Vendor file name Amazon.Lambda.KinesisAnalyticsEvents High Vendor grokassembly InternalName Amazon.Lambda.KinesisAnalyticsEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.KinesisAnalyticsEvents.dll Low Product dll namespace Amazon.Lambda.KinesisAnalyticsEvents Highest Product file name Amazon.Lambda.KinesisAnalyticsEvents High Product grokassembly InternalName Amazon.Lambda.KinesisAnalyticsEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.KinesisAnalyticsEvents.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Related Dependencies Amazon.Lambda.KinesisAnalyticsEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dll MD5: 8f07da2c44d07e00ffd18617185a44a6 SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999a SHA256: 239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427 Amazon.Lambda.KinesisAnalyticsEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dll MD5: 8f07da2c44d07e00ffd18617185a44a6 SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999a SHA256: 239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427 Amazon.Lambda.KinesisAnalyticsEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dll MD5: 8f07da2c44d07e00ffd18617185a44a6 SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999a SHA256: 239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427 Amazon.Lambda.KinesisAnalyticsEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dll MD5: 8f07da2c44d07e00ffd18617185a44a6 SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999a SHA256: 239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427 Amazon.Lambda.KinesisFirehoseEvents.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dllMD5: d82690e43781e417b29ff66f8b5ef4d0SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221SHA256: 179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.KinesisFirehoseEvents Highest Vendor file name Amazon.Lambda.KinesisFirehoseEvents High Vendor grokassembly InternalName Amazon.Lambda.KinesisFirehoseEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.KinesisFirehoseEvents.dll Low Product dll namespace Amazon.Lambda.KinesisFirehoseEvents Highest Product file name Amazon.Lambda.KinesisFirehoseEvents High Product grokassembly InternalName Amazon.Lambda.KinesisFirehoseEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.KinesisFirehoseEvents.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Related Dependencies Amazon.Lambda.KinesisFirehoseEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dll MD5: d82690e43781e417b29ff66f8b5ef4d0 SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221 SHA256: 179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54 Amazon.Lambda.KinesisFirehoseEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dll MD5: d82690e43781e417b29ff66f8b5ef4d0 SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221 SHA256: 179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54 Amazon.Lambda.KinesisFirehoseEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dll MD5: d82690e43781e417b29ff66f8b5ef4d0 SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221 SHA256: 179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54 Amazon.Lambda.KinesisFirehoseEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dll MD5: d82690e43781e417b29ff66f8b5ef4d0 SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221 SHA256: 179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54 Amazon.Lambda.LexEvents.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dllMD5: b89322ea82ad62547d97a46dd9dc14b6SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54SHA256: 96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.LexEvents Highest Vendor file name Amazon.Lambda.LexEvents High Vendor grokassembly InternalName Amazon.Lambda.LexEvents.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.LexEvents.dll Low Product dll namespace Amazon.Lambda.LexEvents Highest Product file name Amazon.Lambda.LexEvents High Product grokassembly InternalName Amazon.Lambda.LexEvents.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.LexEvents.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Related Dependencies Amazon.Lambda.LexEvents.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dll MD5: b89322ea82ad62547d97a46dd9dc14b6 SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54 SHA256: 96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a Amazon.Lambda.LexEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dll MD5: b89322ea82ad62547d97a46dd9dc14b6 SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54 SHA256: 96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a Amazon.Lambda.LexEvents.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dll MD5: b89322ea82ad62547d97a46dd9dc14b6 SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54 SHA256: 96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a Amazon.Lambda.LexEvents.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dll MD5: b89322ea82ad62547d97a46dd9dc14b6 SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54 SHA256: 96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a Amazon.Lambda.Logging.AspNetCore.dllDescription:
Amazon.Lambda.Logging.AspNetCore
ASP.NET Core logging support for Lambda. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Logging.AspNetCore.dllMD5: 9482935b3e88a8679c51b76bad324279SHA1: 680ec56a97395d0c0f61bd550e0d2df20621e7c6SHA256: 770e5dfc23757a239061d5748dd0a2af820160cb84d793766cc2cabb6f4eeaf4
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.Logging.AspNetCore Highest Vendor file name Amazon.Lambda.Logging.AspNetCore High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription Amazon.Lambda.Logging.AspNetCore Low Vendor grokassembly InternalName Amazon.Lambda.Logging.AspNetCore.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.Logging.AspNetCore.dll Low Vendor grokassembly ProductName Amazon Web Services Lambda Interface for .NET Medium Product dll namespace Amazon.Lambda.Logging.AspNetCore Highest Product file name Amazon.Lambda.Logging.AspNetCore High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription Amazon.Lambda.Logging.AspNetCore High Product grokassembly InternalName Amazon.Lambda.Logging.AspNetCore.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.Logging.AspNetCore.dll Medium Product grokassembly ProductName Amazon Web Services Lambda Interface for .NET Highest Version grokassembly FileVersion 2.0.0.0 High
Amazon.Lambda.S3Events.dllDescription:
Amazon.Lambda.S3Events
Lambda event interfaces for S3 event source. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.S3Events.dllMD5: 5ef1a162e3b5f0c31e8d4580f4624790SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49SHA256: 8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.S3Events Highest Vendor file name Amazon.Lambda.S3Events High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly FileDescription Amazon.Lambda.S3Events Low Vendor grokassembly InternalName Amazon.Lambda.S3Events.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.S3Events.dll Low Vendor grokassembly ProductName Amazon Web Services Lambda Interface for .NET Medium Product dll namespace Amazon.Lambda.S3Events Highest Product file name Amazon.Lambda.S3Events High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly FileDescription Amazon.Lambda.S3Events High Product grokassembly InternalName Amazon.Lambda.S3Events.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.S3Events.dll Medium Product grokassembly ProductName Amazon Web Services Lambda Interface for .NET Highest Version grokassembly FileVersion 1.0.0.0 High
Related Dependencies Amazon.Lambda.S3Events.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.S3Events.dll MD5: 5ef1a162e3b5f0c31e8d4580f4624790 SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49 SHA256: 8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd Amazon.Lambda.S3Events.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Amazon.Lambda.S3Events.dll MD5: 5ef1a162e3b5f0c31e8d4580f4624790 SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49 SHA256: 8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd Amazon.Lambda.S3Events.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Amazon.Lambda.S3Events.dll MD5: 5ef1a162e3b5f0c31e8d4580f4624790 SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49 SHA256: 8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd Amazon.Lambda.S3Events.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.S3Events.dll MD5: 5ef1a162e3b5f0c31e8d4580f4624790 SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49 SHA256: 8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd Amazon.Lambda.Serialization.SystemTextJson.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Serialization.SystemTextJson.dllMD5: b77fcbcec7c650a0c1713ea9a1d09de2SHA1: 0cd156da025e57bdd625f1df7f817cb52007a372SHA256: a8ff5ed7ce213b6741500a3337e474a250daebd21146146f81f2ebdf31ce38e8
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.Serialization.SystemTextJson Highest Vendor file name Amazon.Lambda.Serialization.SystemTextJson High Vendor grokassembly InternalName Amazon.Lambda.Serialization.SystemTextJson.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.Serialization.SystemTextJson.dll Low Product dll namespace Amazon.Lambda.Serialization.SystemTextJson Highest Product file name Amazon.Lambda.Serialization.SystemTextJson High Product grokassembly InternalName Amazon.Lambda.Serialization.SystemTextJson.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.Serialization.SystemTextJson.dll Medium Version grokassembly FileVersion 0.0.0.0 High
Related Dependencies Amazon.Lambda.Serialization.SystemTextJson.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Amazon.Lambda.Serialization.SystemTextJson.dll MD5: fc3ed5ce748bd770852433e5f8576c3a SHA1: 93abbb2f8363656a7fe4f7cc64db91cf59bbc95e SHA256: f7e24eb3b36cbee20ab0e219645739a3f0b46f71a39de050ed0e60eee923d727 pkg:generic/Amazon.Lambda.Serialization.SystemTextJson@0.0.0.0 Amazon.Lambda.Serialization.SystemTextJson.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.Serialization.SystemTextJson.dll MD5: fc3ed5ce748bd770852433e5f8576c3a SHA1: 93abbb2f8363656a7fe4f7cc64db91cf59bbc95e SHA256: f7e24eb3b36cbee20ab0e219645739a3f0b46f71a39de050ed0e60eee923d727 Amazon.Lambda.Serialization.SystemTextJson:2.1.0File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Amazon Medium Vendor msbuild id Amazon.Lambda.Serialization.SystemTextJson Medium Vendor msbuild id Lambda Low Vendor msbuild id Lambda.Serialization.SystemTextJson Low Product msbuild id Amazon.Lambda.Serialization.SystemTextJson Highest Product msbuild id Lambda Medium Product msbuild id Lambda.Serialization.SystemTextJson Medium Version msbuild version 2.1.0 Highest
Amazon.Lambda.TestUtilities.dllDescription:
Amazon.Lambda.TestUtilties includes stub implementations of interfaces defined in Amazon.Lambda.Core and helper methods. File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.TestUtilities.dllMD5: 826762c8a91a919ea831875b0d7d78adSHA1: f5e073535f9336b543f8a9c2c6bc16e3fa67991dSHA256: d093bbb3ffc49a56a8fa4dce76ec8b7984b609d73a17fab5d5f5c573f0efa9c9
Evidence Type Source Name Value Confidence Vendor dll namespace Amazon.Lambda.TestUtilities Highest Vendor file name Amazon.Lambda.TestUtilities High Vendor grokassembly CompanyName Amazon.com, Inc Highest Vendor grokassembly InternalName Amazon.Lambda.TestUtilities.dll Low Vendor grokassembly OriginalFilename Amazon.Lambda.TestUtilities.dll Low Vendor grokassembly ProductName Amazon.Lambda.TestUtilities Medium Product dll namespace Amazon.Lambda.TestUtilities Highest Product file name Amazon.Lambda.TestUtilities High Product grokassembly CompanyName Amazon.com, Inc Low Product grokassembly InternalName Amazon.Lambda.TestUtilities.dll Medium Product grokassembly OriginalFilename Amazon.Lambda.TestUtilities.dll Medium Product grokassembly ProductName Amazon.Lambda.TestUtilities Highest Version grokassembly FileVersion 1.0.0.0 High
Amazon.Lambda.TestUtilities:2.0.0File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Amazon Medium Vendor msbuild id Amazon.Lambda.TestUtilities Medium Vendor msbuild id Lambda Low Vendor msbuild id Lambda.TestUtilities Low Product msbuild id Amazon.Lambda.TestUtilities Highest Product msbuild id Lambda Medium Product msbuild id Lambda.TestUtilities Medium Version msbuild version 2.0.0 Highest
AutoMapper.Extensions.Microsoft.DependencyInjection.dllDescription:
AutoMapper.Extensions.Microsoft.DependencyInjection
AutoMapper extensions for ASP.NET Core File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AutoMapper.Extensions.Microsoft.DependencyInjection.dllMD5: bf5a14d1fdeba396f8d80bf66d217820SHA1: 8f6b9999990441713357167e68401e9464b8b09bSHA256: 89637796f62f8c6ef5a4d01e869d7cf79ed5c50316b1e6af28e6d84952c77ea8
Evidence Type Source Name Value Confidence Vendor dll namespace AutoMapper Highest Vendor file name AutoMapper.Extensions.Microsoft.DependencyInjection High Vendor grokassembly CompanyName Jimmy Bogard Highest Vendor grokassembly FileDescription AutoMapper.Extensions.Microsoft.DependencyInjection Low Vendor grokassembly InternalName AutoMapper.Extensions.Microsoft.DependencyInjection.dll Low Vendor grokassembly OriginalFilename AutoMapper.Extensions.Microsoft.DependencyInjection.dll Low Vendor grokassembly ProductName AutoMapper.Extensions.Microsoft.DependencyInjection Medium Vendor msbuild id AutoMapper Medium Vendor msbuild id AutoMapper.Extensions.Microsoft.DependencyInjection Medium Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Microsoft.DependencyInjection Low Product dll namespace AutoMapper Highest Product file name AutoMapper.Extensions.Microsoft.DependencyInjection High Product grokassembly CompanyName Jimmy Bogard Low Product grokassembly FileDescription AutoMapper.Extensions.Microsoft.DependencyInjection High Product grokassembly InternalName AutoMapper.Extensions.Microsoft.DependencyInjection.dll Medium Product grokassembly OriginalFilename AutoMapper.Extensions.Microsoft.DependencyInjection.dll Medium Product grokassembly ProductName AutoMapper.Extensions.Microsoft.DependencyInjection Highest Product msbuild id AutoMapper.Extensions.Microsoft.DependencyInjection Highest Product msbuild id Extensions Medium Product msbuild id Extensions.Microsoft.DependencyInjection Medium Version AssemblyAnalyzer FilteredVersion 7.0.0 Highest Version msbuild version 7.0.0 Highest
Related Dependencies AutoMapper.Extensions.Microsoft.DependencyInjection:7.0.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/AutoMapper.Extensions.Microsoft.DependencyInjection@7.0.0 AutoMapper.dllDescription:
AutoMapper
A convention-based object-object mapper. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AutoMapper.dllMD5: 4ae1c613bb4d98881e5ecfc5dd74471eSHA1: 11e1f342709437e30fe8a66284eb11360dcaa889SHA256: 8890c79488484a283961028752a4f4b25f04a33222d838990225f99376748085
Evidence Type Source Name Value Confidence Vendor dll namespace AutoMapper Highest Vendor file name AutoMapper High Vendor grokassembly CompanyName Jimmy Bogard Highest Vendor grokassembly FileDescription AutoMapper Low Vendor grokassembly InternalName AutoMapper.dll Low Vendor grokassembly OriginalFilename AutoMapper.dll Low Vendor grokassembly ProductName AutoMapper Medium Product dll namespace AutoMapper Highest Product file name AutoMapper High Product grokassembly CompanyName Jimmy Bogard Low Product grokassembly FileDescription AutoMapper High Product grokassembly InternalName AutoMapper.dll Medium Product grokassembly OriginalFilename AutoMapper.dll Medium Product grokassembly ProductName AutoMapper Highest Version AssemblyAnalyzer FilteredVersion 9.0.0 Highest
AwsParameterStore.Microsoft.Extensions.Configuration.dllDescription:
AwsParameterStore.Microsoft.Extensions.Configuration
AWS Systems Manager Parameter Store configuration provider implementation for Microsoft.Extensions.Configuration. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AwsParameterStore.Microsoft.Extensions.Configuration.dllMD5: 6cff4cd5f4718297b37aa5e5bdc12d3bSHA1: c45342ce39b8ea74491f13ab6382a1b479a7ad60SHA256: 903a0610bba31e40d1031e08d2a51354754f06c542678e587fbedab222def010
Evidence Type Source Name Value Confidence Vendor dll namespace AwsParameterStore.Microsoft.Extensions.Configuration Highest Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor file name AwsParameterStore.Microsoft.Extensions.Configuration High Vendor grokassembly CompanyName Hossam Barakat Highest Vendor grokassembly FileDescription AwsParameterStore.Microsoft.Extensions.Configuration Low Vendor grokassembly InternalName AwsParameterStore.Microsoft.Extensions.Configuration.dll Low Vendor grokassembly OriginalFilename AwsParameterStore.Microsoft.Extensions.Configuration.dll Low Vendor grokassembly ProductName AwsParameterStore.Microsoft.Extensions.Configuration Medium Vendor msbuild id AwsParameterStore Medium Vendor msbuild id AwsParameterStore.Microsoft.Extensions.Configuration Medium Vendor msbuild id Microsoft Low Vendor msbuild id Microsoft.Extensions.Configuration Low Product dll namespace AwsParameterStore.Microsoft.Extensions.Configuration Highest Product dll namespace Microsoft.Extensions.Configuration Highest Product file name AwsParameterStore.Microsoft.Extensions.Configuration High Product grokassembly CompanyName Hossam Barakat Low Product grokassembly FileDescription AwsParameterStore.Microsoft.Extensions.Configuration High Product grokassembly InternalName AwsParameterStore.Microsoft.Extensions.Configuration.dll Medium Product grokassembly OriginalFilename AwsParameterStore.Microsoft.Extensions.Configuration.dll Medium Product grokassembly ProductName AwsParameterStore.Microsoft.Extensions.Configuration Highest Product msbuild id AwsParameterStore.Microsoft.Extensions.Configuration Highest Product msbuild id Microsoft Medium Product msbuild id Microsoft.Extensions.Configuration Medium Version AssemblyAnalyzer FilteredVersion 0.7.0 Highest Version grokassembly ProductVersion 0.7.0 Highest Version msbuild version 0.7.0 Highest
Related Dependencies AwsParameterStore.Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AwsParameterStore.Microsoft.Extensions.Configuration.dll MD5: 6cff4cd5f4718297b37aa5e5bdc12d3b SHA1: c45342ce39b8ea74491f13ab6382a1b479a7ad60 SHA256: 903a0610bba31e40d1031e08d2a51354754f06c542678e587fbedab222def010 AwsParameterStore.Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\AwsParameterStore.Microsoft.Extensions.Configuration.dll MD5: 6cff4cd5f4718297b37aa5e5bdc12d3b SHA1: c45342ce39b8ea74491f13ab6382a1b479a7ad60 SHA256: 903a0610bba31e40d1031e08d2a51354754f06c542678e587fbedab222def010 AwsParameterStore.Microsoft.Extensions.Configuration:0.7.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/AwsParameterStore.Microsoft.Extensions.Configuration@0.7.0 BaseCommunicationService.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\communication\BaseCommunicationService.jsMD5: d52f352cbbd12b515f31dd4346de6462SHA1: 3c5d0be67b93cd8e5076bd29f04e1b34e0b739e0SHA256: 12662a257feafc6a5c76f629587035fe0940eb2e8d8ee3fb56b11b7ba27c18b0
Evidence Type Source Name Value Confidence
BaseModel.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\BaseModel.jsMD5: 91e078c5c57c3fe8d1c7b33358507870SHA1: f598d799ed6fa2ee566ad80733a6a900b7363e81SHA256: 86f5faa8904900bad3057a68166b8cbd2ebeb66a53262ae429de1369368d1da2
Evidence Type Source Name Value Confidence
BaseModel.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\BaseModel.jsMD5: 63c25b56380823c470516a66b68096e1SHA1: d750d4164c3d083ad9cc1065f91f4e69a27077b3SHA256: 5639749cdfa66ddace4fecd7a45cf16476bcb80c52095f87657f91039e142e99
Evidence Type Source Name Value Confidence
Castle.Core.dllDescription:
Castle Core
Castle Core, including DynamicProxy, Logging Abstractions and DictionaryAdapter File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Castle.Core.dllMD5: e22bfef97c2f4eb2f188c5fedde63380SHA1: 97a897886d72852edefc43bba31070a2b69183d1SHA256: be886e2e643aeff56bffa81c008050709971de8e20387408ae508630a05bcd79
Evidence Type Source Name Value Confidence Vendor dll namespace Castle.Core Highest Vendor file name Castle.Core High Vendor grokassembly CompanyName Castle Project Contributors Highest Vendor grokassembly FileDescription Castle Core Low Vendor grokassembly InternalName Castle.Core.dll Low Vendor grokassembly OriginalFilename Castle.Core.dll Low Vendor grokassembly ProductName Castle Core Medium Product dll namespace Castle.Core Highest Product file name Castle.Core High Product grokassembly CompanyName Castle Project Contributors Low Product grokassembly FileDescription Castle Core High Product grokassembly InternalName Castle.Core.dll Medium Product grokassembly OriginalFilename Castle.Core.dll Medium Product grokassembly ProductName Castle Core Highest Version AssemblyAnalyzer FilteredVersion 4.3.1 Highest Version grokassembly FileVersion 4.3.1 High Version grokassembly ProductVersion 4.3.1 Highest
Castle.Core.dllDescription:
Castle Core
Castle Core, including DynamicProxy, Logging Abstractions and DictionaryAdapter File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Castle.Core.dllMD5: c61b61fdcb770f341eb7a903fc9684a9SHA1: 03b6586f30739006f6ef3a4645205b91c1544b8dSHA256: 7f34412cf227e622eff0d0a687c1f08c3297b8df8435780f02b99e60da842c80
Evidence Type Source Name Value Confidence Vendor dll namespace Castle.Core Highest Vendor file name Castle.Core High Vendor grokassembly CompanyName Castle Project Contributors Highest Vendor grokassembly FileDescription Castle Core Low Vendor grokassembly InternalName Castle.Core.dll Low Vendor grokassembly OriginalFilename Castle.Core.dll Low Vendor grokassembly ProductName Castle Core Medium Product dll namespace Castle.Core Highest Product file name Castle.Core High Product grokassembly CompanyName Castle Project Contributors Low Product grokassembly FileDescription Castle Core High Product grokassembly InternalName Castle.Core.dll Medium Product grokassembly OriginalFilename Castle.Core.dll Medium Product grokassembly ProductName Castle Core Highest Version AssemblyAnalyzer FilteredVersion 4.2.1 Highest Version grokassembly FileVersion 4.2.1 High Version grokassembly ProductVersion 4.2.1 Highest
Category.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\Category.jsMD5: e2aee4f618589acfbb3e4682aa6c4d30SHA1: 67dc834f7381d3449da3d621d5969479afcb47e5SHA256: 5386fed9b419295d79d14458d2b15175ca528862917d2595ad1df2309cfef206
Evidence Type Source Name Value Confidence
Category.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\Category.jsMD5: 55c05a52f576b5fd4b5a0bdf0d3ac40bSHA1: 32abbbac5a77bce8e4a1d5eafaa450f409cbb1feSHA256: e4e6c124804a5997bce4a450fb7b98bbfae892c3d57c3ca93a70dc07d3f93287
Evidence Type Source Name Value Confidence
CommonService.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\services\CommonService.jsMD5: aaff1849e222c71eee20175df71fb4c5SHA1: 410a63e1e29067055f74ba60b6291413336db9dcSHA256: 7548eec3983f1a2680da6148559512c5f12eaff9d6f98fc90ca5715c585db494
Evidence Type Source Name Value Confidence
CommonUtil.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\utils\CommonUtil.jsMD5: 812e1bec8f406aa190317b58e9f68b16SHA1: a18a0d343924e645e7c1912dafae25aa38c23664SHA256: e3444f0a13aa95ecc01fd632ef27ce254b7ab09b85f9a3fa2dc65b6478e516be
Evidence Type Source Name Value Confidence
CommonUtility.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\utils\CommonUtility.jsMD5: 871a43fcd083546f2038892bbc13921bSHA1: 699f713f857d754ff869faf59f5943329b2df591SHA256: 3d2027f6af0c50c935b0702e57db7caba2c32f03055acdecdce4aefa0c1d1dec
Evidence Type Source Name Value Confidence
CommonUtility.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\utils\CommonUtility.jsMD5: c4badce96e253b032b8f7a4c0912e2ebSHA1: 5a25b813f1af093c15609a1377e15f53606b8c40SHA256: 62d5597e8c9811cebc7941f2225a578eb379cab139c6de718cabdf310f26ae75
Evidence Type Source Name Value Confidence
CommonValidationMessages.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\CommonValidationMessages.jsMD5: a931369c0ec6c4ae47f9753f75d50c0fSHA1: d0eb6e27a2792a3c073186d6ea409306d4494bb6SHA256: 4777a1eb8f70a40f69bc8c8fbbdc37117a05f174fd056351630db5c0deeee012
Evidence Type Source Name Value Confidence
CommonValidationMessages.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\messages\CommonValidationMessages.jsMD5: a1861fdbeb2d5db80a67f985377a2be9SHA1: 669e2dde1d41121d77f477a15c3abebc3b56b2b2SHA256: ce0c2e74e0f1c2c44492e6acc1649137c222f856b0d11f9cc36211061c4ea319
Evidence Type Source Name Value Confidence
ConfigurerType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\ConfigurerType.jsMD5: 0edae756c6c7f8ae34ed0756873f16b5SHA1: d25884940d7c49531efa243e3f4ac2d57ed6d545SHA256: 48541fb542e9e3f1d1a9e6d1a66e4116d8a79b0d5a50915d3dc7c8793a7bf6dc
Evidence Type Source Name Value Confidence
CountriesSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\CountriesSwagger.jsMD5: 286daaa08f32589758bfadd2c3f366b7SHA1: f08354e05636afb4b8eb2083c62ee73fa90b4cdeSHA256: 7b138a14f0336956242753c2ca0851f5b0afeab4c40e2235336f507d52515383
Evidence Type Source Name Value Confidence
CustomErrors.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\exceptions\CustomErrors.jsMD5: 9e1e96f05b175a9846b8afed2eac1d30SHA1: 1f78d06ad968a0fb625286d9d72d961bc104af76SHA256: 66ef92f44ff85866bfef3041fc0fe6a3081de6b56005bb9d36888e0b8045a5c5
Evidence Type Source Name Value Confidence
CustomErrors.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\exceptions\CustomErrors.jsMD5: b47d6fdf8bb3d16db299f3333b805734SHA1: 3390566c7e89cc7cc17d9d2a5ab7de5f046355baSHA256: 153adab223ec354945b62ed9c932ad23611b189366d04b26450c22b69c6dd89e
Evidence Type Source Name Value Confidence
CustomQueryBuilder.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\CustomQueryBuilder.jsMD5: e6cae74d6995ff88dc38a98c6b4c4582SHA1: 8beb3aa88edb40d7fe8aebfc7aa743a6753574eeSHA256: 5a53cdae0cd1fff81c63b104eb586fceb5d6d95ba51b19ac9f402c5eee4db9e3
Evidence Type Source Name Value Confidence
CustomerEventHandler.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\CustomerEventHandler.jsMD5: 25f466c587f84acd23bf402107bdeebcSHA1: ad982c92d676a558ec016ac8913c393240ce105bSHA256: 4aeff4a701b7c070f5b67970feefe97da9cb0b2f2a66f0a5e685b712cfca9ec9
Evidence Type Source Name Value Confidence
CustomerEvents.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\constants\CustomerEvents.jsMD5: 227b126f23af3eb4b6ba2142579d6e8fSHA1: 4b26db921332d64f94a6926e27c2501462641885SHA256: 7750da0ad18ae4c8bc9b5817cfd2c5481b3d2c954abd1f691dac0a4b643d2244
Evidence Type Source Name Value Confidence
CustomerFlexFieldValueSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\CustomerFlexFieldValueSwagger.jsMD5: c544fae87a3b5210db1baf9180f667e0SHA1: a87763a11eaa3f5fb4d01bda55c4a7683cc83a50SHA256: fe4badbbb5dff1a9aacf570f79072ff4c7fa5c35c5d8f7ea7c9cc53a25433127
Evidence Type Source Name Value Confidence
CustomerRepository.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\repository\CustomerRepository.jsMD5: 95b6f0268803096c6e121e5137175bfaSHA1: d842794b8f56661d1982a8cda2fc5efc2d8ed9c1SHA256: 5f48a2172b7492b284d0df264ccd56daeb3e11c5c5415cdebaea466c540a0cd4
Evidence Type Source Name Value Confidence
CustomerRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\CustomerRepository.jsMD5: 9060fa7372f737e2071849509f2cad55SHA1: e65175b33b994cb0f5bf1727ff3ccfd2a9103b2dSHA256: 6d5a9b561313aa1f7298c37eb356ffee927a947b9432255424b1e31d07406472
Evidence Type Source Name Value Confidence
Customers.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\Customers.jsMD5: 13f10a4f2ceeea0641d81ec468d583ceSHA1: 31472128b95a7cd812554501ccc1c67eb7eec5d0SHA256: ea31b6b990bf8293a0aed0d845da37627d9fe37994e3265b3c7522df8a9b57b5
Evidence Type Source Name Value Confidence
DefaultMerchantTax.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\model\DefaultMerchantTax.jsMD5: 61fdc11ad35e5ef16b1106c454938d97SHA1: e0b55d4b6a5c56c8eb697bb1fcfc880414b51afaSHA256: d2f8f7c98ee2269b32ba443898fa290c7689a8f0bea382659f9beea9e75dc9fb
Evidence Type Source Name Value Confidence
DefaultMerchantTaxAssembler.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\assembler\DefaultMerchantTaxAssembler.jsMD5: de7059c43d903be5626cf5ddb413fd1aSHA1: 82dde8a70d05e89c06589762ae2684284c15840eSHA256: 911bf877e148538a4e39fa849c6e890537c603bc43dc4eabd2601622090d6679
Evidence Type Source Name Value Confidence
DefaultMerchantTaxController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\controllers\DefaultMerchantTaxController.jsMD5: eb8cee738f6c2f362bda28e471c4c0c8SHA1: 19cc1f133d2d783ab90499453eb09d9dac0aacdcSHA256: d2b210d05229dea633e7aec721491d2b0cbcdfe84ee1534e1a81a4c90823e306
Evidence Type Source Name Value Confidence
DefaultMerchantTaxRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\repositories\DefaultMerchantTaxRepository.jsMD5: bad88fb31793fa8d7d0c0b0e1731845eSHA1: 6da140404eb16934a855dda4af89679dd86785b3SHA256: eb5a3acf8223bc311f014f91c7c33e56b519d99777177464de201f309606261b
Evidence Type Source Name Value Confidence
DefaultMerchantTaxSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\schemas\DefaultMerchantTaxSchema.jsMD5: 772d80c905326702dc2fcb8744d7b225SHA1: d524cb7e459ed9b0cf75c37d50dcddac7a92a4f7SHA256: e0c6c5fa85b2ef5dcd6c43d349978bfcc73cf2d1a4d67422655d0462859401b6
Evidence Type Source Name Value Confidence
Related Dependencies TaxSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\schemas\TaxSchema.js MD5: 772d80c905326702dc2fcb8744d7b225 SHA1: d524cb7e459ed9b0cf75c37d50dcddac7a92a4f7 SHA256: e0c6c5fa85b2ef5dcd6c43d349978bfcc73cf2d1a4d67422655d0462859401b6 DefaultMerchantTaxServices.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\services\DefaultMerchantTaxServices.jsMD5: be86c81d73e15ab9d8c98054ec06a1fcSHA1: 96d8f604f15be06daaba0906c861b9280aca5e67SHA256: 65da30fa0dfce4a89ec4be5dbe686298ae3363c81ff527ba81199fecb851fc04
Evidence Type Source Name Value Confidence
DefaultMerchantTaxSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\DefaultMerchantTaxSwagger.jsMD5: 6ac199cb17833bd61b4fc1b1c0bfd51fSHA1: a9dd1d91f3e93dbca259f9dc148577943161be0dSHA256: 764a41616c2726fe2285ff21d11ef550f9fbed90d4b4d87c10b42e73525583a9
Evidence Type Source Name Value Confidence
EntityType.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\EntityType.jsMD5: a18e3c8255bbe952e68ebb2c1e30e97eSHA1: ef274ba6882f7d136acd6d814aa98d2e182d9849SHA256: 10b3ee14891d795899621abce05fd3cb5547be5943f2a72a035704f53ba5042b
Evidence Type Source Name Value Confidence
EventType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\EventType.jsMD5: 1da46f253535d16399db4f9dfd1f5ca6SHA1: 71abc8ba59269b6471b96c70d88b4e5e98d1877dSHA256: 408526009ffce56fe6e5e4f98ba2852f298341ccd25add8f2ca23565681201b6
Evidence Type Source Name Value Confidence
EventType.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\EventType.jsMD5: 0675fe10458e96b7ab515196f75307f0SHA1: f5397a106e4f7938f360595f7dd0b0cd1ffee5f3SHA256: 9d2d2f568a543cb024217ad3c08b6e388db0ae4d8426921c61fe2a497da61554
Evidence Type Source Name Value Confidence
ExceptionMapper.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\exceptions\ExceptionMapper.jsMD5: cab538b815c78f845333e94fade99730SHA1: 00dc0cd35f0ce8964b2f9bb36b1baa90b741f9dcSHA256: f386066066c9158ef95a9fe2c600d3d015ec24d04d646def868b9e877e960062
Evidence Type Source Name Value Confidence
ExceptionMapper.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\exceptions\ExceptionMapper.jsMD5: a2764c476099900847c0bd3c911f93c1SHA1: 7dcde25990f4e0b09193864d93b5c088814ec88bSHA256: 4814b59ca493f8ef1acb9f5396f8e350d2365e651d90d3987ba857b7b8856cdd
Evidence Type Source Name Value Confidence
Fee.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\model\Fee.jsMD5: b228eba779de6ceda3a77666ff2d9f81SHA1: 1bea86e35cb623814322ea9e6278f9deefbf5fa5SHA256: 741314377f421f23a8ab28f540ddf6937bb8c505001efa184b7885fe5cb5c7e3
Evidence Type Source Name Value Confidence
FeeAssembler.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\assembler\FeeAssembler.jsMD5: 12f71cc11db4780ff284889195ef1129SHA1: 00eafdd1cdf12f80c4a39c1b4c2344a71af61e92SHA256: 264ee8713f99a22276c9c979a764c304da5ffcd66725ab86fcf275fa015384e0
Evidence Type Source Name Value Confidence
FeeConfigurationValidationMessage.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\FeeConfigurationValidationMessage.jsMD5: cdac38ccadc4be48972cb95a5950c4f6SHA1: b9e8d4e1de1de1dcc1cad8fa841a0eee93e3a0f6SHA256: 9ab65bdeff06f9275e82f481226821940f936734d3de57f4e0ed34c1c9792387
Evidence Type Source Name Value Confidence
FeeController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\controllers\FeeController.jsMD5: 601fd840b59300d8c7530cdb108dd10aSHA1: cd46ff73e0b24ba274ad7b8e0024ba6b6c406761SHA256: 9493ac818cca533e41d48e5983387de66bcae123e5e7e4419ebe96c8afb58fdb
Evidence Type Source Name Value Confidence
FeeRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\repositories\FeeRepository.jsMD5: 81f3908a7e585cca5edc39f1de9d63beSHA1: 68f9b50209337a9780381201f2d80b21f9b0f9f6SHA256: 3546af43388d7056afa4bfcaa9489d57cb304770c3796514825e92f3f019e1fa
Evidence Type Source Name Value Confidence
FeeSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\schemas\FeeSchema.jsMD5: 253e5ed198fc714c5d2eba8432d87addSHA1: a0385fa3c0782d953134d6398b41a7dbc7427ce8SHA256: 9ce62f335bec5cbe6c0841a86bfbbd301150037a33e5bf0ce38007dbdbd47b24
Evidence Type Source Name Value Confidence
FeeServices.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\services\FeeServices.jsMD5: 5fbb06a2a82ab098914111a96fd40d88SHA1: 27ed2bd00054951842d0813e954785867c531784SHA256: 85eb5a6e27abb7d83b45e0de4e27f05cca5b6b895b5ae862b310726ec98d8d9a
Evidence Type Source Name Value Confidence
FeeSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FeeSwagger.jsMD5: 26c56bf32dc0fd89b6fa748411028d1dSHA1: ed745ca1d050b417c031f161eb5518ceafa170bcSHA256: eff02f0480fa7aed7c84d07939439ee7d5bb94fe4b0b5fe029cb9b38f42a18e9
Evidence Type Source Name Value Confidence
FeeType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\FeeType.jsMD5: 59630d00231003de30ddf13f704e87ffSHA1: 9d4b1868b5c798859bb614e8aab66a9eec0b5e96SHA256: 68f8a1b2e34d1689b5b15178716b92206f4b4edc244dfa71946b8f53ffe6c72e
Evidence Type Source Name Value Confidence
FieldValidation.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\utils\FieldValidation.jsMD5: c09a4afca4e35d1ed802add9fb204fe6SHA1: c43a53fab42d1cefff70199159b6695f4f56b975SHA256: 9152dc763ace2f906e223607e08f0f5936a6c86ab53e41e43dd7dac78ebb10ab
Evidence Type Source Name Value Confidence
FlexFieldValueSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FlexFieldValueSwagger.jsMD5: a6abe6abd1a2d55867fdbdc70c00f0b0SHA1: 04c51b00e4892186943fb96c199c76016ff6db26SHA256: 0e98d71ab7426ef1910d0027df47dc1e3429c336167bf548ca80d4f75fba2bea
Evidence Type Source Name Value Confidence
FlexFields.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FlexFields.jsMD5: bc1f8018e2a4468b5a4a63c0cf0ea6c1SHA1: 47492e4a1e9a5220b703269b5bae3168052722eaSHA256: c9a4e5a199751191d6c868e0592858a47da8af305bdbbc1c3fd9d43d429df115
Evidence Type Source Name Value Confidence
FluentValidation.AspNetCore.dllDescription:
FluentValidation.AspNetCore
AspNetCore integration for FluentValidation File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.AspNetCore.dllMD5: 8e216637cc046d978f094941eb698c40SHA1: 5b6a2071b4055f93be71fc42e55ec60b0ad5882bSHA256: 50fef80fb821c6d0b221aab984b4e0b0ced37b4ad2e21b8eb4459de4d5fca349
Evidence Type Source Name Value Confidence Vendor dll namespace FluentValidation.AspNetCore Highest Vendor file name FluentValidation.AspNetCore High Vendor grokassembly CompanyName Jeremy Skinner Highest Vendor grokassembly FileDescription FluentValidation.AspNetCore Low Vendor grokassembly InternalName FluentValidation.AspNetCore.dll Low Vendor grokassembly OriginalFilename FluentValidation.AspNetCore.dll Low Vendor grokassembly ProductName FluentValidation.AspNetCore Medium Product dll namespace FluentValidation.AspNetCore Highest Product file name FluentValidation.AspNetCore High Product grokassembly CompanyName Jeremy Skinner Low Product grokassembly FileDescription FluentValidation.AspNetCore High Product grokassembly InternalName FluentValidation.AspNetCore.dll Medium Product grokassembly OriginalFilename FluentValidation.AspNetCore.dll Medium Product grokassembly ProductName FluentValidation.AspNetCore Highest Version AssemblyAnalyzer FilteredVersion 9.2.0 Highest
FluentValidation.AspNetCore:11.0.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id AspNetCore Low Vendor msbuild id FluentValidation Medium Vendor msbuild id FluentValidation.AspNetCore Medium Product msbuild id AspNetCore Medium Product msbuild id FluentValidation.AspNetCore Highest Version msbuild version 11.0.0 Highest
FluentValidation.DependencyInjectionExtensions.dllDescription:
FluentValidation.DependencyInjectionExtensions
Dependency injection extensions for FluentValidation File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.DependencyInjectionExtensions.dllMD5: 0033eee7f05c774e2271b3b848d426cdSHA1: cf79f75aaf9db05c41f215db02964b18874e367cSHA256: 3168b9f878f6c92775d9c57d2b3eea4c72107b72541c424ac859672fd80d5608
Evidence Type Source Name Value Confidence Vendor dll namespace FluentValidation Highest Vendor file name FluentValidation.DependencyInjectionExtensions High Vendor grokassembly CompanyName Jeremy Skinner Highest Vendor grokassembly FileDescription FluentValidation.DependencyInjectionExtensions Low Vendor grokassembly InternalName FluentValidation.DependencyInjectionExtensions.dll Low Vendor grokassembly OriginalFilename FluentValidation.DependencyInjectionExtensions.dll Low Vendor grokassembly ProductName FluentValidation.DependencyInjectionExtensions Medium Product dll namespace FluentValidation Highest Product file name FluentValidation.DependencyInjectionExtensions High Product grokassembly CompanyName Jeremy Skinner Low Product grokassembly FileDescription FluentValidation.DependencyInjectionExtensions High Product grokassembly InternalName FluentValidation.DependencyInjectionExtensions.dll Medium Product grokassembly OriginalFilename FluentValidation.DependencyInjectionExtensions.dll Medium Product grokassembly ProductName FluentValidation.DependencyInjectionExtensions Highest Version AssemblyAnalyzer FilteredVersion 9.2.0 Highest
FluentValidation.dllDescription:
FluentValidation
A validation library for .NET that uses a fluent interface to construct strongly-typed validation rules. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.dllMD5: b2b8f1e70976a3542d7d2c5a7357b34eSHA1: b700e72f97f0c8babfc8c38bc22bc2cd00b85567SHA256: 668f03932c1e61d41fcf7d2f4b591cd2d08c6bdd83aec8c74e2309780125302f
Evidence Type Source Name Value Confidence Vendor dll namespace FluentValidation Highest Vendor file name FluentValidation High Vendor grokassembly CompanyName Jeremy Skinner Highest Vendor grokassembly FileDescription FluentValidation Low Vendor grokassembly InternalName FluentValidation.dll Low Vendor grokassembly OriginalFilename FluentValidation.dll Low Vendor grokassembly ProductName FluentValidation Medium Product dll namespace FluentValidation Highest Product file name FluentValidation High Product grokassembly CompanyName Jeremy Skinner Low Product grokassembly FileDescription FluentValidation High Product grokassembly InternalName FluentValidation.dll Medium Product grokassembly OriginalFilename FluentValidation.dll Medium Product grokassembly ProductName FluentValidation Highest Version AssemblyAnalyzer FilteredVersion 9.2.0 Highest
Frequency.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\Frequency.jsMD5: 91c5fe62a7d7f70a1a1a08865d81c050SHA1: a251d5d2aa4bb68cf17d83fe70d48bb26273b1e8SHA256: 5170a7bf52e17f18ab8f3469be28031b19397d086b626db2da584d1b71cdd082
Evidence Type Source Name Value Confidence
Hashids.net.dllDescription:
Hashids.net
Generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Hashids.net.dllMD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0deSHA256: c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42
Evidence Type Source Name Value Confidence Vendor file name Hashids.net High Vendor grokassembly CompanyName Markus Ullmark Highest Vendor grokassembly FileDescription Hashids.net Low Vendor grokassembly InternalName Hashids.net.dll Low Vendor grokassembly OriginalFilename Hashids.net.dll Low Vendor grokassembly ProductName Hashids.net Medium Vendor msbuild id Hashids Medium Vendor msbuild id Hashids.net Medium Vendor msbuild id net Low Product file name Hashids.net High Product grokassembly CompanyName Markus Ullmark Low Product grokassembly FileDescription Hashids.net High Product grokassembly InternalName Hashids.net.dll Medium Product grokassembly OriginalFilename Hashids.net.dll Medium Product grokassembly ProductName Hashids.net Highest Product msbuild id Hashids.net Highest Product msbuild id net Medium Version AssemblyAnalyzer FilteredVersion 1.3.0 Highest Version grokassembly ProductVersion 1.3.0 Highest Version msbuild version 1.3.0 Highest
Related Dependencies Hashids.net.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Hashids.net.dll MD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7 SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0de SHA256: c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42 Hashids.net.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Hashids.net.dll MD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7 SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0de SHA256: c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42 Hashids.net.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Hashids.net.dll MD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7 SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0de SHA256: c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42 Hashids.net.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Hashids.net.dll MD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7 SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0de SHA256: c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42 Hashids.net:1.3.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/Hashids.net@1.3.0 Hashids.net:1.3.0File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Hashids.net@1.3.0 Humanizer.dllDescription:
Humanizer
A micro-framework that turns your normal strings, type names, enum fields, date fields ETC into a human friendly format File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Humanizer.dllMD5: b23ec3bf471a12c288f2a46b428bd013SHA1: 766c5bf33247f5d399f410873f4640c35fbc885eSHA256: 15e988ab3e8d84900ae90549eb399aac452d55edf0109e06fa1a9b227ddfd4c4
Evidence Type Source Name Value Confidence Vendor dll namespace Humanizer Highest Vendor file name Humanizer High Vendor grokassembly CompanyName Mehdi Khalili, Claire Novotny Highest Vendor grokassembly FileDescription Humanizer Low Vendor grokassembly InternalName Humanizer.dll Low Vendor grokassembly OriginalFilename Humanizer.dll Low Vendor grokassembly ProductName Humanizer (netstandard2.0) Medium Product dll namespace Humanizer Highest Product file name Humanizer High Product grokassembly CompanyName Mehdi Khalili, Claire Novotny Low Product grokassembly FileDescription Humanizer High Product grokassembly InternalName Humanizer.dll Medium Product grokassembly OriginalFilename Humanizer.dll Medium Product grokassembly ProductName Humanizer (netstandard2.0) Highest Version AssemblyAnalyzer FilteredVersion 2.8.26 Highest
InternalCommunicationService.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\services\InternalCommunicationService.jsMD5: 04163d424efa4a16e60fe6496a7ab1d9SHA1: 5690e46fc87c14f8592ae072fe04964f8254b486SHA256: fad457bad7131d2f1b5754c94c7931bf5a97b218b3a3a529c317876e7558ffc8
Evidence Type Source Name Value Confidence
Lumigo.DotNET.Instrumentation.dllDescription:
Lumigo.DotNET.Instrumentation File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dllMD5: e4d82c66569f9018e8eb35f07a0853b9SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8bSHA256: a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c
Evidence Type Source Name Value Confidence Vendor dll namespace Lumigo.DotNET.Instrumentation Highest Vendor file name Lumigo.DotNET.Instrumentation High Vendor grokassembly CompanyName Lumigo.DotNET.Instrumentation Highest Vendor grokassembly FileDescription Lumigo.DotNET.Instrumentation Low Vendor grokassembly InternalName Lumigo.DotNET.Instrumentation.dll Low Vendor grokassembly OriginalFilename Lumigo.DotNET.Instrumentation.dll Low Vendor grokassembly ProductName Lumigo.DotNET.Instrumentation Medium Product dll namespace Lumigo.DotNET.Instrumentation Highest Product file name Lumigo.DotNET.Instrumentation High Product grokassembly CompanyName Lumigo.DotNET.Instrumentation Low Product grokassembly FileDescription Lumigo.DotNET.Instrumentation High Product grokassembly InternalName Lumigo.DotNET.Instrumentation.dll Medium Product grokassembly OriginalFilename Lumigo.DotNET.Instrumentation.dll Medium Product grokassembly ProductName Lumigo.DotNET.Instrumentation Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Lumigo.DotNET.Instrumentation.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dll MD5: e4d82c66569f9018e8eb35f07a0853b9 SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8b SHA256: a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c Lumigo.DotNET.Instrumentation.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dll MD5: e4d82c66569f9018e8eb35f07a0853b9 SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8b SHA256: a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c Lumigo.DotNET.Instrumentation.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dll MD5: e4d82c66569f9018e8eb35f07a0853b9 SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8b SHA256: a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c Lumigo.DotNET.Instrumentation.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dll MD5: e4d82c66569f9018e8eb35f07a0853b9 SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8b SHA256: a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c Lumigo.DotNET.Parser.dllDescription:
Lumigo.DotNET.Parser File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Parser.dllMD5: 8f73799c54f37cfe9242d24a8cadb19eSHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddcSHA256: 953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80
Evidence Type Source Name Value Confidence Vendor dll namespace Lumigo.DotNET.Parser Highest Vendor file name Lumigo.DotNET.Parser High Vendor grokassembly CompanyName Lumigo.DotNET.Parser Highest Vendor grokassembly FileDescription Lumigo.DotNET.Parser Low Vendor grokassembly InternalName Lumigo.DotNET.Parser.dll Low Vendor grokassembly OriginalFilename Lumigo.DotNET.Parser.dll Low Vendor grokassembly ProductName Lumigo.DotNET.Parser Medium Product dll namespace Lumigo.DotNET.Parser Highest Product file name Lumigo.DotNET.Parser High Product grokassembly CompanyName Lumigo.DotNET.Parser Low Product grokassembly FileDescription Lumigo.DotNET.Parser High Product grokassembly InternalName Lumigo.DotNET.Parser.dll Medium Product grokassembly OriginalFilename Lumigo.DotNET.Parser.dll Medium Product grokassembly ProductName Lumigo.DotNET.Parser Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Lumigo.DotNET.Parser.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Lumigo.DotNET.Parser.dll MD5: 8f73799c54f37cfe9242d24a8cadb19e SHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddc SHA256: 953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80 Lumigo.DotNET.Parser.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Lumigo.DotNET.Parser.dll MD5: 8f73799c54f37cfe9242d24a8cadb19e SHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddc SHA256: 953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80 Lumigo.DotNET.Parser.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Lumigo.DotNET.Parser.dll MD5: 8f73799c54f37cfe9242d24a8cadb19e SHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddc SHA256: 953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80 Lumigo.DotNET.Parser.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Lumigo.DotNET.Parser.dll MD5: 8f73799c54f37cfe9242d24a8cadb19e SHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddc SHA256: 953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80 Lumigo.DotNET.Utilities.dllDescription:
Lumigo.DotNET.Utilities File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dllMD5: 57723ebe4b524e97b1a8eef9b434f7acSHA1: 5f5c55f891b979890f606721a65fb020a516ba3bSHA256: ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955
Evidence Type Source Name Value Confidence Vendor dll namespace Lumigo.DotNET.Utilities Highest Vendor file name Lumigo.DotNET.Utilities High Vendor grokassembly CompanyName Lumigo.DotNET.Utilities Highest Vendor grokassembly FileDescription Lumigo.DotNET.Utilities Low Vendor grokassembly InternalName Lumigo.DotNET.Utilities.dll Low Vendor grokassembly OriginalFilename Lumigo.DotNET.Utilities.dll Low Vendor grokassembly ProductName Lumigo.DotNET.Utilities Medium Product dll namespace Lumigo.DotNET.Utilities Highest Product file name Lumigo.DotNET.Utilities High Product grokassembly CompanyName Lumigo.DotNET.Utilities Low Product grokassembly FileDescription Lumigo.DotNET.Utilities High Product grokassembly InternalName Lumigo.DotNET.Utilities.dll Medium Product grokassembly OriginalFilename Lumigo.DotNET.Utilities.dll Medium Product grokassembly ProductName Lumigo.DotNET.Utilities Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Lumigo.DotNET.Utilities.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dll MD5: 57723ebe4b524e97b1a8eef9b434f7ac SHA1: 5f5c55f891b979890f606721a65fb020a516ba3b SHA256: ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955 Lumigo.DotNET.Utilities.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dll MD5: 57723ebe4b524e97b1a8eef9b434f7ac SHA1: 5f5c55f891b979890f606721a65fb020a516ba3b SHA256: ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955 Lumigo.DotNET.Utilities.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dll MD5: 57723ebe4b524e97b1a8eef9b434f7ac SHA1: 5f5c55f891b979890f606721a65fb020a516ba3b SHA256: ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955 Lumigo.DotNET.Utilities.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dll MD5: 57723ebe4b524e97b1a8eef9b434f7ac SHA1: 5f5c55f891b979890f606721a65fb020a516ba3b SHA256: ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955 Lumigo.DotNET.dllDescription:
Lumigo.DotNET File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.dllMD5: 8dd28f78db0d271e52f6cb3995d610a4SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557SHA256: d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106
Evidence Type Source Name Value Confidence Vendor dll namespace Lumigo.DotNET Highest Vendor file name Lumigo.DotNET High Vendor grokassembly CompanyName Lumigo.DotNET Highest Vendor grokassembly FileDescription Lumigo.DotNET Low Vendor grokassembly InternalName Lumigo.DotNET.dll Low Vendor grokassembly OriginalFilename Lumigo.DotNET.dll Low Vendor grokassembly ProductName Lumigo.DotNET Medium Vendor msbuild id DotNET Low Vendor msbuild id Lumigo Medium Vendor msbuild id Lumigo.DotNET Medium Product dll namespace Lumigo.DotNET Highest Product file name Lumigo.DotNET High Product grokassembly CompanyName Lumigo.DotNET Low Product grokassembly FileDescription Lumigo.DotNET High Product grokassembly InternalName Lumigo.DotNET.dll Medium Product grokassembly OriginalFilename Lumigo.DotNET.dll Medium Product grokassembly ProductName Lumigo.DotNET Highest Product msbuild id DotNET Medium Product msbuild id Lumigo.DotNET Highest Version AssemblyAnalyzer FilteredVersion 1.0.45 Highest Version grokassembly ProductVersion 1.0.45 Highest Version msbuild version 1.0.45 Highest
Related Dependencies Lumigo.DotNET.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Lumigo.DotNET.dll MD5: 8dd28f78db0d271e52f6cb3995d610a4 SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557 SHA256: d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106 Lumigo.DotNET.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Lumigo.DotNET.dll MD5: 8dd28f78db0d271e52f6cb3995d610a4 SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557 SHA256: d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106 Lumigo.DotNET.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Lumigo.DotNET.dll MD5: 8dd28f78db0d271e52f6cb3995d610a4 SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557 SHA256: d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106 Lumigo.DotNET.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Lumigo.DotNET.dll MD5: 8dd28f78db0d271e52f6cb3995d610a4 SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557 SHA256: d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106 Lumigo.DotNET:1.0.45File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Lumigo.DotNET@1.0.45 Lumigo.DotNET:1.0.45File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Lumigo.DotNET@1.0.45 MSTest.TestAdapter:1.3.2File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id MSTest Medium Vendor msbuild id MSTest.TestAdapter Medium Vendor msbuild id TestAdapter Low Product msbuild id MSTest.TestAdapter Highest Product msbuild id TestAdapter Medium Version msbuild version 1.3.2 Highest
MSTest.TestAdapter:2.1.0File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id MSTest Medium Vendor msbuild id MSTest.TestAdapter Medium Vendor msbuild id TestAdapter Low Product msbuild id MSTest.TestAdapter Highest Product msbuild id TestAdapter Medium Version msbuild version 2.1.0 Highest
MSTest.TestFramework:1.3.2File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id MSTest Medium Vendor msbuild id MSTest.TestFramework Medium Vendor msbuild id TestFramework Low Product msbuild id MSTest.TestFramework Highest Product msbuild id TestFramework Medium Version msbuild version 1.3.2 Highest
MSTest.TestFramework:2.1.0File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id MSTest Medium Vendor msbuild id MSTest.TestFramework Medium Vendor msbuild id TestFramework Low Product msbuild id MSTest.TestFramework Highest Product msbuild id TestFramework Medium Version msbuild version 2.1.0 Highest
Masters.API.Tests.csprojFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csprojMD5: 8bc7f8c76f627264598f4168db357c72SHA1: 165ba5917f7578355bceadf89183c2c50b10d383SHA256: 7002d1e2304a1309b52cb9c2c257f6460ddbc163ec657c064beac7e38dbd2efe
Evidence Type Source Name Value Confidence Vendor file name Masters.API.Tests High Product file name Masters.API.Tests High
Masters.API.Tests.dllDescription:
Masters.API.Tests File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Masters.API.Tests.dllMD5: 0d6edfdf97b96fa9df9cae068cf1e6a5SHA1: a165371394295b87acc932cb247773512f0c9306SHA256: 656402e53c43927385e8321bae49c3f4b42490436dfcefd76a08978d68a9ec46
Evidence Type Source Name Value Confidence Vendor file name Masters.API.Tests High Vendor grokassembly CompanyName Masters.API.Tests Highest Vendor grokassembly FileDescription Masters.API.Tests Low Vendor grokassembly InternalName Masters.API.Tests.dll Low Vendor grokassembly OriginalFilename Masters.API.Tests.dll Low Vendor grokassembly ProductName Masters.API.Tests Medium Product file name Masters.API.Tests High Product grokassembly CompanyName Masters.API.Tests Low Product grokassembly FileDescription Masters.API.Tests High Product grokassembly InternalName Masters.API.Tests.dll Medium Product grokassembly OriginalFilename Masters.API.Tests.dll Medium Product grokassembly ProductName Masters.API.Tests Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Masters.API.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\obj\Debug\net6.0\Masters.API.Tests.dll MD5: 0d6edfdf97b96fa9df9cae068cf1e6a5 SHA1: a165371394295b87acc932cb247773512f0c9306 SHA256: 656402e53c43927385e8321bae49c3f4b42490436dfcefd76a08978d68a9ec46 Masters.API.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\obj\Debug\net6.0\ref\Masters.API.Tests.dll MD5: a26c4905b3a91b86bca5ca2c689d0ac8 SHA1: 26d7690ebdde9c33cb2aeae8fd10558e6ea0d8e7 SHA256: 3df9111a0003cd7dc3c1fcf78fce57b0f792d6ddbfce235057ceef8643f1e011 pkg:generic/Masters.API.Tests@1.0.0 Masters.API.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\obj\Debug\net6.0\refint\Masters.API.Tests.dll MD5: a26c4905b3a91b86bca5ca2c689d0ac8 SHA1: 26d7690ebdde9c33cb2aeae8fd10558e6ea0d8e7 SHA256: 3df9111a0003cd7dc3c1fcf78fce57b0f792d6ddbfce235057ceef8643f1e011 Masters.API.csprojFile Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csprojMD5: b6dc4b330fdf8afa287b3ff0673c9114SHA1: 7a181d4e9486b08f3ca513cfb447a99c3c521b26SHA256: d3eb7ab096d01b57ada305614d764d656c7f03483cff04cd522b9a6127b401e5
Evidence Type Source Name Value Confidence Vendor file name Masters.API High Product file name Masters.API High
Masters.API.dllDescription:
Masters.API File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.API.dllMD5: 4ce0c5cca1ffb1ddae95e39d8d39a74dSHA1: f09fd5c8a09ca44d89f76cfcf807d1c7af2a0fdfSHA256: e31655e7f9d9ea668fd58684dddfa9af686a505d3a7e1f36d8a0557f2c3a6af5
Evidence Type Source Name Value Confidence Vendor dll namespace Masters.API Highest Vendor file name Masters.API High Vendor grokassembly CompanyName Masters.API Highest Vendor grokassembly FileDescription Masters.API Low Vendor grokassembly InternalName Masters.API.dll Low Vendor grokassembly OriginalFilename Masters.API.dll Low Vendor grokassembly ProductName Masters.API Medium Product dll namespace Masters.API Highest Product file name Masters.API High Product grokassembly CompanyName Masters.API Low Product grokassembly FileDescription Masters.API High Product grokassembly InternalName Masters.API.dll Medium Product grokassembly OriginalFilename Masters.API.dll Medium Product grokassembly ProductName Masters.API Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Masters.API.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\obj\Debug\net6.0\Masters.API.dll MD5: 4ce0c5cca1ffb1ddae95e39d8d39a74d SHA1: f09fd5c8a09ca44d89f76cfcf807d1c7af2a0fdf SHA256: e31655e7f9d9ea668fd58684dddfa9af686a505d3a7e1f36d8a0557f2c3a6af5 Masters.API.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\obj\Debug\net6.0\ref\Masters.API.dll MD5: c8ea9e9423fdbe9def7cf5180afb9a21 SHA1: d60d32d2bfc342760cb86e2ce28e0c1e40bfd5cf SHA256: 237d85722ccf98482878eeec68805c568023083edd34866697f405219869ab76 pkg:generic/Masters.API@1.0.0 Masters.API.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\obj\Debug\net6.0\refint\Masters.API.dll MD5: c8ea9e9423fdbe9def7cf5180afb9a21 SHA1: d60d32d2bfc342760cb86e2ce28e0c1e40bfd5cf SHA256: 237d85722ccf98482878eeec68805c568023083edd34866697f405219869ab76 Masters.API.exeFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.API.exeMD5: f934999494beb77e9ae519f675a4ee42SHA1: d4ada1de63e16b554913c5177e64b065e22bbd97SHA256: 5b7af9c5b6a638e44c1b894e13b8be178369bbca0a09293e73049885268a687d
Evidence Type Source Name Value Confidence Vendor file name Masters.API High Product file name Masters.API High
Related Dependencies apphost.exeFile Path: D:\Auropayrepos\Masters\src\Masters.API\obj\Debug\net6.0\apphost.exe MD5: f934999494beb77e9ae519f675a4ee42 SHA1: d4ada1de63e16b554913c5177e64b065e22bbd97 SHA256: 5b7af9c5b6a638e44c1b894e13b8be178369bbca0a09293e73049885268a687d Masters.Tests.csprojFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csprojMD5: 9c903c009ef70a41ee07381b267876c2SHA1: 7e7a6194c14189926395e1298a36e3c2904f71efSHA256: 02b272918310449acbd45d3ff04901af2375b9da776bccfa540343f7faf56562
Evidence Type Source Name Value Confidence Vendor file name Masters.Tests High Product file name Masters.Tests High
Masters.Tests.dllDescription:
Masters.Tests File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Masters.Tests.dllMD5: 3e879109953da76806e0b8042f434075SHA1: 55a98b28d49a1f09221c67d7d8c98580eaef230eSHA256: 32c5e5d88bc019534924ea3c7356eb4c2f9ec827831bbc9dd9049dad5e41e91e
Evidence Type Source Name Value Confidence Vendor file name Masters.Tests High Vendor grokassembly CompanyName Masters.Tests Highest Vendor grokassembly FileDescription Masters.Tests Low Vendor grokassembly InternalName Masters.Tests.dll Low Vendor grokassembly OriginalFilename Masters.Tests.dll Low Vendor grokassembly ProductName Masters.Tests Medium Product file name Masters.Tests High Product grokassembly CompanyName Masters.Tests Low Product grokassembly FileDescription Masters.Tests High Product grokassembly InternalName Masters.Tests.dll Medium Product grokassembly OriginalFilename Masters.Tests.dll Medium Product grokassembly ProductName Masters.Tests Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Masters.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\obj\Debug\net6.0\Masters.Tests.dll MD5: 3e879109953da76806e0b8042f434075 SHA1: 55a98b28d49a1f09221c67d7d8c98580eaef230e SHA256: 32c5e5d88bc019534924ea3c7356eb4c2f9ec827831bbc9dd9049dad5e41e91e Masters.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\obj\Debug\net6.0\ref\Masters.Tests.dll MD5: 4b104cdd1c76d97483a6e12f28983c9b SHA1: 7a8f69caf8504f83b7bf0fe43521fbe3b274dfd6 SHA256: 46cb3b1449bcc9a87ae84b4ae537f931e66de3d6d259033d4c82fd64780e0ad4 pkg:generic/Masters.Tests@1.0.0 Masters.Tests.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\obj\Debug\net6.0\refint\Masters.Tests.dll MD5: 4b104cdd1c76d97483a6e12f28983c9b SHA1: 7a8f69caf8504f83b7bf0fe43521fbe3b274dfd6 SHA256: 46cb3b1449bcc9a87ae84b4ae537f931e66de3d6d259033d4c82fd64780e0ad4 Masters.csprojFile Path: D:\Auropayrepos\Masters\src\Masters\Masters.csprojMD5: f8197039c176ac43bacbbfd3c3900595SHA1: f19606b09c74eb1dd2a759cc1574b20f4a54f941SHA256: d33fd682e554468205a500d89eb80d4dd77b44e5781f7d969ea645a65c8d13ce
Evidence Type Source Name Value Confidence Vendor file name Masters High Product file name Masters High
Masters.dllDescription:
Masters File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.dllMD5: d61df461594279c23e03a1c00c0667e4SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb
Evidence Type Source Name Value Confidence Vendor file name Masters High Vendor grokassembly CompanyName Masters Highest Vendor grokassembly FileDescription Masters Low Vendor grokassembly InternalName Masters.dll Low Vendor grokassembly OriginalFilename Masters.dll Low Vendor grokassembly ProductName Masters Medium Product file name Masters High Product grokassembly CompanyName Masters Low Product grokassembly FileDescription Masters High Product grokassembly InternalName Masters.dll Medium Product grokassembly OriginalFilename Masters.dll Medium Product grokassembly ProductName Masters Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies Masters.dllFile Path: D:\Auropayrepos\Masters\src\Masters\bin\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Masters.dllFile Path: D:\Auropayrepos\Masters\src\Masters\obj\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Masters.dllFile Path: D:\Auropayrepos\Masters\src\Masters\obj\Debug\net6.0\ref\Masters.dll MD5: bda650758d6b70520366679059edae72 SHA1: a99fb3a04d4a49c32a2cf2a7681589f13eb55479 SHA256: b27c8439ded3ba9e61b57aaeb27a75a1c40523dfbb6ad3026300bae480131315 pkg:generic/Masters@1.0.0 Masters.dllFile Path: D:\Auropayrepos\Masters\src\Masters\obj\Debug\net6.0\refint\Masters.dll MD5: bda650758d6b70520366679059edae72 SHA1: a99fb3a04d4a49c32a2cf2a7681589f13eb55479 SHA256: b27c8439ded3ba9e61b57aaeb27a75a1c40523dfbb6ad3026300bae480131315 Masters.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Masters.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Masters.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Masters.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Masters.dll MD5: d61df461594279c23e03a1c00c0667e4 SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978 SHA256: d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb Merchant.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\Merchant.jsMD5: d273717716b8f0d5c5782bd0e87e0dd9SHA1: 4c7efd52635d263274c4f35919660ee2d1f38fb9SHA256: 902b2e9afc1a6908fb4bedaa6aab661565456e0b8407e4422e8a02d622323aed
Evidence Type Source Name Value Confidence
MerchantFlexFields.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\MerchantFlexFields.jsMD5: bcd7c4057cfc17dfae9d1a4bbd2175d3SHA1: cac26be567516a16257d76e8c04cfd47cc901a3bSHA256: eebf4e7f867c7df654db1cb0932523b963ca80e2560f9848a0acdf01eda8946a
Evidence Type Source Name Value Confidence
MerchantRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\MerchantRepository.jsMD5: ffc30ab4490188d4f5d5e4b9e0b58302SHA1: 310b7db8e0dbd8561ce832ef34e5c36ad9b1acf0SHA256: 5e599319e3b6c2fca0a58eef183af85cc53eb2c9b5b203197f251dbe40612d1c
Evidence Type Source Name Value Confidence
MerchantWebhookSubscriptionSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\MerchantWebhookSubscriptionSwagger.jsMD5: aaf754d36b39b223aef3e0232da28806SHA1: f8bb79615d55278ec5a662ca18815ba397fddb62SHA256: b79278e8934f994aa7bb0d18ccd95db1e6c8768007e8c3dfdbed109eb5bdb3b9
Evidence Type Source Name Value Confidence
Microsoft.AspNetCore.Authentication.JwtBearer.dllDescription:
Microsoft.AspNetCore.Authentication.JwtBearer
ASP.NET Core middleware that enables an application to receive an OpenID Connect bearer token. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.AspNetCore.Authentication.JwtBearer.dllMD5: d787c7a72bc2b2c185412a976678170aSHA1: d94a7115fa68f456cf5b78b4c24d3d4dd014af2eSHA256: 657875e470479035f4a2ce7bf7af20816749e4e639b11ca1483ba29911db24ed
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.AspNetCore.Authentication.JwtBearer Highest Vendor file name Microsoft.AspNetCore.Authentication.JwtBearer High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.AspNetCore.Authentication.JwtBearer Low Vendor grokassembly InternalName Microsoft.AspNetCore.Authentication.JwtBearer.dll Low Vendor grokassembly OriginalFilename Microsoft.AspNetCore.Authentication.JwtBearer.dll Low Vendor grokassembly ProductName Microsoft ASP.NET Core Medium Product dll namespace Microsoft.AspNetCore.Authentication.JwtBearer Highest Product file name Microsoft.AspNetCore.Authentication.JwtBearer High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.AspNetCore.Authentication.JwtBearer High Product grokassembly InternalName Microsoft.AspNetCore.Authentication.JwtBearer.dll Medium Product grokassembly OriginalFilename Microsoft.AspNetCore.Authentication.JwtBearer.dll Medium Product grokassembly ProductName Microsoft ASP.NET Core Highest Version grokassembly FileVersion 3.100.320.16314 High
Microsoft.AspNetCore.Authentication.JwtBearer:3.1.3File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id AspNetCore Low Vendor msbuild id AspNetCore.Authentication.JwtBearer Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.AspNetCore.Authentication.JwtBearer Medium Product msbuild id AspNetCore Medium Product msbuild id AspNetCore.Authentication.JwtBearer Medium Product msbuild id Microsoft.AspNetCore.Authentication.JwtBearer Highest Version msbuild version 3.1.3 Highest
CVE-2021-34532 (OSSINDEX) suppress
ASP.NET Core and Visual Studio Information Disclosure Vulnerability CWE-noinfo
CVSSv2:
Base Score: LOW (2.0999999046325684) Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:*:Microsoft.AspNetCore.Authentication.JwtBearer:3.1.3:*:*:*:*:*:*:* Microsoft.AspNetCore.Hosting.Server.Abstractions.dllDescription:
Microsoft.AspNetCore.Hosting.Server.Abstractions
ASP.NET Core hosting server abstractions for web applications. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.AspNetCore.Hosting.Server.Abstractions.dllMD5: 191047a4897093d8750268ba063784bdSHA1: 704f5cb461f1065eabfa9c99e937cc54329ec52fSHA256: 2aa879f203ea973722e1e8c862baaae6bc165f8b70ac24918873af3aa20c906d
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.AspNetCore.Hosting.Server Highest Vendor file name Microsoft.AspNetCore.Hosting.Server.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.AspNetCore.Hosting.Server.Abstractions Low Vendor grokassembly InternalName Microsoft.AspNetCore.Hosting.Server.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.AspNetCore.Hosting.Server.Abstractions.dll Low Vendor grokassembly ProductName Microsoft ASP.NET Core Medium Product dll namespace Microsoft.AspNetCore.Hosting.Server Highest Product file name Microsoft.AspNetCore.Hosting.Server.Abstractions High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.AspNetCore.Hosting.Server.Abstractions High Product grokassembly InternalName Microsoft.AspNetCore.Hosting.Server.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.AspNetCore.Hosting.Server.Abstractions.dll Medium Product grokassembly ProductName Microsoft ASP.NET Core Highest Version AssemblyAnalyzer FilteredVersion 2.0.3 Highest
Related Dependencies Microsoft.AspNetCore.JsonPatch.dllDescription:
Microsoft.AspNetCore.JsonPatch
ASP.NET Core support for JSON PATCH. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.AspNetCore.JsonPatch.dllMD5: c37498e27a9761e82ae24e1e757f3691SHA1: 0592f910f2c039fb786085397b800ce62c454174SHA256: f721bfbf0071870dbbeb2497b51dfacceb472e1d35fb757b308d932ecb3f497b
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.AspNetCore.JsonPatch Highest Vendor file name Microsoft.AspNetCore.JsonPatch High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.AspNetCore.JsonPatch Low Vendor grokassembly InternalName Microsoft.AspNetCore.JsonPatch.dll Low Vendor grokassembly OriginalFilename Microsoft.AspNetCore.JsonPatch.dll Low Vendor grokassembly ProductName Microsoft ASP.NET Core Medium Product dll namespace Microsoft.AspNetCore.JsonPatch Highest Product file name Microsoft.AspNetCore.JsonPatch High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.AspNetCore.JsonPatch High Product grokassembly InternalName Microsoft.AspNetCore.JsonPatch.dll Medium Product grokassembly OriginalFilename Microsoft.AspNetCore.JsonPatch.dll Medium Product grokassembly ProductName Microsoft ASP.NET Core Highest Version grokassembly FileVersion 3.100.19.56601 High
Related Dependencies Microsoft.AspNetCore.Mvc.NewtonsoftJson.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.AspNetCore.Mvc.NewtonsoftJson.dll MD5: 856eb30baa67abd6fca48bb9e75663e6 SHA1: afd7fdcda5cac42a31eadd1a41ce9aebbf67f868 SHA256: fc99c5dd72879a9ac4ddb898b41f32f7dcc79792a02659ed820bf486794dd708 pkg:generic/Microsoft.AspNetCore.Mvc.NewtonsoftJson@3.100.19.56601 Microsoft.AspNetCore.Mvc.NewtonsoftJson:3.1.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id AspNetCore Low Vendor msbuild id AspNetCore.Mvc.NewtonsoftJson Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.AspNetCore.Mvc.NewtonsoftJson Medium Product msbuild id AspNetCore Medium Product msbuild id AspNetCore.Mvc.NewtonsoftJson Medium Product msbuild id Microsoft.AspNetCore.Mvc.NewtonsoftJson Highest Version msbuild version 3.1.0 Highest
Microsoft.DotNet.PlatformAbstractions.dllDescription:
Abstractions for making code that uses file system and environment testable. File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.DotNet.PlatformAbstractions.dllMD5: a69ee0c1195620088b4efb1e8c9dca3dSHA1: cede41194639465753550adecbecf32e85e582c7SHA256: 359451c3e3be25f7c383713787d1a3e762579c648bbce8e37b5010c0622f9681
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.DotNet.PlatformAbstractions Highest Vendor file name Microsoft.DotNet.PlatformAbstractions High Vendor grokassembly InternalName Microsoft.DotNet.PlatformAbstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.DotNet.PlatformAbstractions.dll Low Product dll namespace Microsoft.DotNet.PlatformAbstractions Highest Product file name Microsoft.DotNet.PlatformAbstractions High Product grokassembly InternalName Microsoft.DotNet.PlatformAbstractions.dll Medium Product grokassembly OriginalFilename Microsoft.DotNet.PlatformAbstractions.dll Medium Version AssemblyAnalyzer FilteredVersion 1.0.1 Highest
Microsoft.EntityFrameworkCore.Abstractions.dllDescription:
Microsoft.EntityFrameworkCore.Abstractions
Provides abstractions and attributes that are used to configure Entity Framework Core File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dllMD5: 10d7e7d4107ff1292ce723a0e295a210SHA1: 064b9fb9c0af946f0524a4ae0939f0e5235518e2SHA256: 000b5e98a2973b06a7e9a40be6a640aa87fec8d4c5be870444a62f1e1d999f48
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Abstractions Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Abstractions.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Abstractions High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Abstractions.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Version AssemblyAnalyzer FilteredVersion 6.0.10 Highest Version grokassembly ProductVersion 6.0.10 Highest
Related Dependencies Microsoft.EntityFrameworkCore.Abstractions.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dll MD5: 10d7e7d4107ff1292ce723a0e295a210 SHA1: 064b9fb9c0af946f0524a4ae0939f0e5235518e2 SHA256: 000b5e98a2973b06a7e9a40be6a640aa87fec8d4c5be870444a62f1e1d999f48 Microsoft.EntityFrameworkCore.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dll MD5: 10d7e7d4107ff1292ce723a0e295a210 SHA1: 064b9fb9c0af946f0524a4ae0939f0e5235518e2 SHA256: 000b5e98a2973b06a7e9a40be6a640aa87fec8d4c5be870444a62f1e1d999f48 Microsoft.EntityFrameworkCore.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dll MD5: 10d7e7d4107ff1292ce723a0e295a210 SHA1: 064b9fb9c0af946f0524a4ae0939f0e5235518e2 SHA256: 000b5e98a2973b06a7e9a40be6a640aa87fec8d4c5be870444a62f1e1d999f48 Microsoft.EntityFrameworkCore.Abstractions.dllDescription:
Microsoft.EntityFrameworkCore.Abstractions
Provides abstractions and attributes that are used to configure Entity Framework Core File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dllMD5: 86b1d7511868631ac5a699abfad28641SHA1: b7705d526a2d2297231b463509727590fcef3dd8SHA256: 5fa213113051002988514ca4a25df91d4a8166d7b8ae6b49de419895d7acc1e1
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Abstractions Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Abstractions.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Abstractions High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Abstractions.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Version AssemblyAnalyzer FilteredVersion 6.0.11 Highest Version grokassembly ProductVersion 6.0.11 Highest
Microsoft.EntityFrameworkCore.Design.dllDescription:
Microsoft.EntityFrameworkCore.Design
Shared design-time components for Entity Framework Core tools. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Design.dllMD5: d0cbe8314f64cd49878b2f5ef82f1293SHA1: 71795ba9adb3c4986b43683103ddb7b95da6cf74SHA256: 337f3880797f064a3cb870cda7ffedebeb37b7a9b73ffe9940e761db616e8ef0
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor dll namespace Microsoft.EntityFrameworkCore.Design Highest Vendor file name Microsoft.EntityFrameworkCore.Design High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Design Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Design.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Design.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Vendor msbuild id EntityFrameworkCore Low Vendor msbuild id EntityFrameworkCore.Design Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.EntityFrameworkCore.Design Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product dll namespace Microsoft.EntityFrameworkCore.Design Highest Product file name Microsoft.EntityFrameworkCore.Design High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Design High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Design.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Design.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Product msbuild id EntityFrameworkCore Medium Product msbuild id EntityFrameworkCore.Design Medium Product msbuild id Microsoft.EntityFrameworkCore.Design Highest Version AssemblyAnalyzer FilteredVersion 6.0.10 Highest Version grokassembly ProductVersion 6.0.10 Highest Version msbuild version 6.0.10 Highest
Related Dependencies Microsoft.EntityFrameworkCore.Design:6.0.10File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/Microsoft.EntityFrameworkCore.Design@6.0.10 Microsoft.EntityFrameworkCore.Relational.dllDescription:
Microsoft.EntityFrameworkCore.Relational
Shared Entity Framework Core components for relational database providers. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dllMD5: 8962aec8fbc3c75a3e089fc4640544b9SHA1: 43062bd4185c0696971e2412c5a70e09224d2606SHA256: 8a2d716851524bd05cc4a16778d4edf497c65449a876f15922e48285cc79180c
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore.Relational High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Relational Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Relational.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Relational.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Vendor msbuild id EntityFrameworkCore Low Vendor msbuild id EntityFrameworkCore.Relational Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.EntityFrameworkCore.Relational Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore.Relational High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Relational High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Relational.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Relational.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Product msbuild id EntityFrameworkCore Medium Product msbuild id EntityFrameworkCore.Relational Medium Product msbuild id Microsoft.EntityFrameworkCore.Relational Highest Version AssemblyAnalyzer FilteredVersion 6.0.10 Highest Version grokassembly ProductVersion 6.0.10 Highest Version msbuild version 6.0.10 Highest
Related Dependencies Microsoft.EntityFrameworkCore.Relational.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dll MD5: 8962aec8fbc3c75a3e089fc4640544b9 SHA1: 43062bd4185c0696971e2412c5a70e09224d2606 SHA256: 8a2d716851524bd05cc4a16778d4edf497c65449a876f15922e48285cc79180c Microsoft.EntityFrameworkCore.Relational.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dll MD5: 8962aec8fbc3c75a3e089fc4640544b9 SHA1: 43062bd4185c0696971e2412c5a70e09224d2606 SHA256: 8a2d716851524bd05cc4a16778d4edf497c65449a876f15922e48285cc79180c Microsoft.EntityFrameworkCore.Relational.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dll MD5: 8962aec8fbc3c75a3e089fc4640544b9 SHA1: 43062bd4185c0696971e2412c5a70e09224d2606 SHA256: 8a2d716851524bd05cc4a16778d4edf497c65449a876f15922e48285cc79180c Microsoft.EntityFrameworkCore.Relational:6.0.10File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Microsoft.EntityFrameworkCore.Relational@6.0.10 Microsoft.EntityFrameworkCore.Relational.dllDescription:
Microsoft.EntityFrameworkCore.Relational
Shared Entity Framework Core components for relational database providers. File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dllMD5: 7fc88f8521204fb8dd3d88fccfc95019SHA1: 0355e8588fe03caf93c7b8c62e2d00f1c6466b6cSHA256: 9fdf3e18c8652204ad369c4fd3ebf6daa789c2f3c2cdac6583030007c32a95d2
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore.Relational High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Relational Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Relational.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Relational.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore.Relational High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Relational High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Relational.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Relational.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Version AssemblyAnalyzer FilteredVersion 6.0.11 Highest Version grokassembly ProductVersion 6.0.11 Highest
Microsoft.EntityFrameworkCore.Sqlite.dllDescription:
Microsoft.EntityFrameworkCore.Sqlite
SQLite database provider for Entity Framework Core. This package does not include a copy of the native SQLite library. File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Sqlite.dllMD5: ac226a58c78c52773d582aa4f5624723SHA1: dc14ffc052d87d90416e989f9bbdb3de7998232dSHA256: 5623d0f3c48a81b79f087d26a0202d947c2a48cc80d6a0a09280979835a07e5d
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore.Sqlite High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore.Sqlite Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.Sqlite.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Sqlite.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Vendor msbuild id EntityFrameworkCore Low Vendor msbuild id EntityFrameworkCore.Sqlite Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.EntityFrameworkCore.Sqlite Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore.Sqlite High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore.Sqlite High Product grokassembly InternalName Microsoft.EntityFrameworkCore.Sqlite.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.Sqlite.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Product msbuild id EntityFrameworkCore Medium Product msbuild id EntityFrameworkCore.Sqlite Medium Product msbuild id Microsoft.EntityFrameworkCore.Sqlite Highest Version AssemblyAnalyzer FilteredVersion 6.0.11 Highest Version grokassembly ProductVersion 6.0.11 Highest Version msbuild version 6.0.11 Highest
Related Dependencies Microsoft.Data.Sqlite.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Data.Sqlite.dll MD5: e287d56abbedb3bf5e2c16ce7940a78c SHA1: b1f451da19f71237d8115918dd304d27034a2b0d SHA256: 03f7cc6cf569f184acd759cb11755e411925918e16d960bf7c6662046164197b pkg:generic/Microsoft.Data.Sqlite@6.0.11 Microsoft.EntityFrameworkCore.Sqlite:6.0.11File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj pkg:nuget/Microsoft.EntityFrameworkCore.Sqlite@6.0.11 Microsoft.EntityFrameworkCore.dllDescription:
Microsoft.EntityFrameworkCore
Entity Framework Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations. EF Core works with SQL Server, Azure SQL Database, SQLite, Azure Cosmos DB, MySQL, PostgreSQL, and other databases through a provider plugin API.
Commonly Used Types:
Microsoft.EntityFrameworkCore.DbContext
Microsoft.EntityFrameworkCore.DbSet
File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dllMD5: 852c7e8791f22fdc1c0be01a35b81889SHA1: c9779da9a726f2465fcd0c3e654bb6cc9ea4bf27SHA256: 1c09d5a5a846943a468e444515abccdafe4c787dc003ef5f5d0230baf381c461
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Vendor msbuild id EntityFrameworkCore Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.EntityFrameworkCore Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore High Product grokassembly InternalName Microsoft.EntityFrameworkCore.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Product msbuild id EntityFrameworkCore Medium Product msbuild id Microsoft.EntityFrameworkCore Highest Version AssemblyAnalyzer FilteredVersion 6.0.10 Highest Version grokassembly ProductVersion 6.0.10 Highest Version msbuild version 6.0.10 Highest
Related Dependencies Microsoft.EntityFrameworkCore.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dll MD5: 852c7e8791f22fdc1c0be01a35b81889 SHA1: c9779da9a726f2465fcd0c3e654bb6cc9ea4bf27 SHA256: 1c09d5a5a846943a468e444515abccdafe4c787dc003ef5f5d0230baf381c461 Microsoft.EntityFrameworkCore.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dll MD5: 852c7e8791f22fdc1c0be01a35b81889 SHA1: c9779da9a726f2465fcd0c3e654bb6cc9ea4bf27 SHA256: 1c09d5a5a846943a468e444515abccdafe4c787dc003ef5f5d0230baf381c461 Microsoft.EntityFrameworkCore.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dll MD5: 852c7e8791f22fdc1c0be01a35b81889 SHA1: c9779da9a726f2465fcd0c3e654bb6cc9ea4bf27 SHA256: 1c09d5a5a846943a468e444515abccdafe4c787dc003ef5f5d0230baf381c461 Microsoft.EntityFrameworkCore:6.0.10File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Microsoft.EntityFrameworkCore@6.0.10 Microsoft.EntityFrameworkCore.dllDescription:
Microsoft.EntityFrameworkCore
Entity Framework Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations. EF Core works with SQL Server, Azure SQL Database, SQLite, Azure Cosmos DB, MySQL, PostgreSQL, and other databases through a provider plugin API.
Commonly Used Types:
Microsoft.EntityFrameworkCore.DbContext
Microsoft.EntityFrameworkCore.DbSet
File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dllMD5: 73146811272dc2b5353b3cb9b3e26caaSHA1: 42708abdcb5d9b477ecebfc4be5f29776b860c5bSHA256: da96237f5b353adb2fe4162101668df82453e96d0d82ffecf61bc24c19b18738
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.EntityFrameworkCore Highest Vendor file name Microsoft.EntityFrameworkCore High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.EntityFrameworkCore Low Vendor grokassembly InternalName Microsoft.EntityFrameworkCore.dll Low Vendor grokassembly OriginalFilename Microsoft.EntityFrameworkCore.dll Low Vendor grokassembly ProductName Microsoft Entity Framework Core Medium Product dll namespace Microsoft.EntityFrameworkCore Highest Product file name Microsoft.EntityFrameworkCore High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.EntityFrameworkCore High Product grokassembly InternalName Microsoft.EntityFrameworkCore.dll Medium Product grokassembly OriginalFilename Microsoft.EntityFrameworkCore.dll Medium Product grokassembly ProductName Microsoft Entity Framework Core Highest Version AssemblyAnalyzer FilteredVersion 6.0.11 Highest Version grokassembly ProductVersion 6.0.11 Highest
Microsoft.Extensions.Caching.Abstractions.dllDescription:
Microsoft.Extensions.Caching.Abstractions
Caching abstractions for in-memory cache and distributed cache.
Commonly Used Types:
Microsoft.Extensions.Caching.Distributed.IDistributedCache
Microsoft.Extensions.Caching.Memory.IMemoryCache File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Caching.Abstractions.dllMD5: ad8f9c7c55b0af08132defe0126cb883SHA1: 5af0968158dbf4be321c91137d204dc94e9d6107SHA256: 58b71920a96072dda78f8869681bd95df1e8ad01bd0c7f41fc567620a78f1b62
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Caching.Distributed Highest Vendor dll namespace Microsoft.Extensions.Caching.Memory Highest Vendor file name Microsoft.Extensions.Caching.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Caching.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.Caching.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Caching.Abstractions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Caching.Distributed Highest Product dll namespace Microsoft.Extensions.Caching.Memory Highest Product file name Microsoft.Extensions.Caching.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Caching.Abstractions High Product grokassembly InternalName Microsoft.Extensions.Caching.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Caching.Abstractions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Caching.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Abstractions.dll MD5: ad8f9c7c55b0af08132defe0126cb883 SHA1: 5af0968158dbf4be321c91137d204dc94e9d6107 SHA256: 58b71920a96072dda78f8869681bd95df1e8ad01bd0c7f41fc567620a78f1b62 Microsoft.Extensions.Caching.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Abstractions.dll MD5: ad8f9c7c55b0af08132defe0126cb883 SHA1: 5af0968158dbf4be321c91137d204dc94e9d6107 SHA256: 58b71920a96072dda78f8869681bd95df1e8ad01bd0c7f41fc567620a78f1b62 Microsoft.Extensions.Caching.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Abstractions.dll MD5: ad8f9c7c55b0af08132defe0126cb883 SHA1: 5af0968158dbf4be321c91137d204dc94e9d6107 SHA256: 58b71920a96072dda78f8869681bd95df1e8ad01bd0c7f41fc567620a78f1b62 Microsoft.Extensions.Caching.Memory.dllDescription:
Microsoft.Extensions.Caching.Memory
In-memory cache implementation of Microsoft.Extensions.Caching.Memory.IMemoryCache. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dllMD5: 4b05e228ce48e5aa53361feb8d30398aSHA1: d71b874fee66d6f8bf003b97869050f466c28db7SHA256: 68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Caching.Memory Highest Vendor file name Microsoft.Extensions.Caching.Memory High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Caching.Memory Low Vendor grokassembly InternalName Microsoft.Extensions.Caching.Memory.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Caching.Memory.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Caching.Memory Highest Product file name Microsoft.Extensions.Caching.Memory High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Caching.Memory High Product grokassembly InternalName Microsoft.Extensions.Caching.Memory.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Caching.Memory.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version AssemblyAnalyzer FilteredVersion 6.0.2 Highest
Related Dependencies Microsoft.Extensions.Caching.Memory.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dll MD5: 4b05e228ce48e5aa53361feb8d30398a SHA1: d71b874fee66d6f8bf003b97869050f466c28db7 SHA256: 68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c Microsoft.Extensions.Caching.Memory.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dll MD5: 4b05e228ce48e5aa53361feb8d30398a SHA1: d71b874fee66d6f8bf003b97869050f466c28db7 SHA256: 68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c Microsoft.Extensions.Caching.Memory.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dll MD5: 4b05e228ce48e5aa53361feb8d30398a SHA1: d71b874fee66d6f8bf003b97869050f466c28db7 SHA256: 68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c Microsoft.Extensions.Caching.Memory.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dll MD5: 4b05e228ce48e5aa53361feb8d30398a SHA1: d71b874fee66d6f8bf003b97869050f466c28db7 SHA256: 68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c Microsoft.Extensions.Configuration.Abstractions.dllDescription:
Microsoft.Extensions.Configuration.Abstractions
Abstractions of key-value pair based configuration.
Commonly Used Types:
Microsoft.Extensions.Configuration.IConfiguration
Microsoft.Extensions.Configuration.IConfigurationBuilder
Microsoft.Extensions.Configuration.IConfigurationProvider
Microsoft.Extensions.Configuration.IConfigurationRoot
Microsoft.Extensions.Configuration.IConfigurationSection File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Abstractions.dllMD5: 134885709f7087d3a1bad3108179578aSHA1: c524c7d46a343b75a64bf52b19e3c70c453f9061SHA256: e4eb5eb7e28a5548cd904fe1a9c3569adef91f52b654db8a3c56a0a5177a09eb
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor file name Microsoft.Extensions.Configuration.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Configuration.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.Configuration.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Configuration.Abstractions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Configuration Highest Product file name Microsoft.Extensions.Configuration.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Configuration.Abstractions High Product grokassembly InternalName Microsoft.Extensions.Configuration.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Configuration.Abstractions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Configuration.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Abstractions.dll MD5: 134885709f7087d3a1bad3108179578a SHA1: c524c7d46a343b75a64bf52b19e3c70c453f9061 SHA256: e4eb5eb7e28a5548cd904fe1a9c3569adef91f52b654db8a3c56a0a5177a09eb Microsoft.Extensions.Configuration.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Abstractions.dll MD5: 134885709f7087d3a1bad3108179578a SHA1: c524c7d46a343b75a64bf52b19e3c70c453f9061 SHA256: e4eb5eb7e28a5548cd904fe1a9c3569adef91f52b654db8a3c56a0a5177a09eb Microsoft.Extensions.Configuration.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Abstractions.dll MD5: 134885709f7087d3a1bad3108179578a SHA1: c524c7d46a343b75a64bf52b19e3c70c453f9061 SHA256: e4eb5eb7e28a5548cd904fe1a9c3569adef91f52b654db8a3c56a0a5177a09eb Microsoft.Extensions.Configuration.EnvironmentVariables.dllDescription:
Microsoft.Extensions.Configuration.EnvironmentVariables
Environment variables configuration provider implementation for Microsoft.Extensions.Configuration. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.EnvironmentVariables.dllMD5: 08f52a0ff6e9a3602259930674f95c5eSHA1: 4fd2e59545e6c845f8f9de6ce8fc4540acf1aa25SHA256: 94fb00fe869f78b572e8564d2700b143f392a5ab7c110e8c81981d5edbf632f7
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor dll namespace Microsoft.Extensions.Configuration.EnvironmentVariables Highest Vendor file name Microsoft.Extensions.Configuration.EnvironmentVariables High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Configuration.EnvironmentVariables Low Vendor grokassembly InternalName Microsoft.Extensions.Configuration.EnvironmentVariables.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Configuration.EnvironmentVariables.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Configuration Highest Product dll namespace Microsoft.Extensions.Configuration.EnvironmentVariables Highest Product file name Microsoft.Extensions.Configuration.EnvironmentVariables High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Configuration.EnvironmentVariables High Product grokassembly InternalName Microsoft.Extensions.Configuration.EnvironmentVariables.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Configuration.EnvironmentVariables.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version AssemblyAnalyzer FilteredVersion 6.0.2 Highest
Related Dependencies Microsoft.Extensions.Configuration.EnvironmentVariables.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.EnvironmentVariables.dll MD5: 08f52a0ff6e9a3602259930674f95c5e SHA1: 4fd2e59545e6c845f8f9de6ce8fc4540acf1aa25 SHA256: 94fb00fe869f78b572e8564d2700b143f392a5ab7c110e8c81981d5edbf632f7 Microsoft.Extensions.Configuration.EnvironmentVariables:6.0.1File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Configuration.EnvironmentVariables Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Configuration.EnvironmentVariables Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Configuration.EnvironmentVariables Medium Product msbuild id Microsoft.Extensions.Configuration.EnvironmentVariables Highest Version msbuild version 6.0.1 Highest
Microsoft.Extensions.Configuration.FileExtensions.dllDescription:
Microsoft.Extensions.Configuration.FileExtensions
Extension methods for configuring file-based configuration providers for Microsoft.Extensions.Configuration. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.FileExtensions.dllMD5: 3604168610204920999aeb27fa52ce14SHA1: 5ad4642c871d47e022080f5c707da159b432efe7SHA256: 9f67d13f6ff5b463736821793d4e218134a51caf3ce8ebe205fd9801db3735d1
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor file name Microsoft.Extensions.Configuration.FileExtensions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Configuration.FileExtensions Low Vendor grokassembly InternalName Microsoft.Extensions.Configuration.FileExtensions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Configuration.FileExtensions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Configuration Highest Product file name Microsoft.Extensions.Configuration.FileExtensions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Configuration.FileExtensions High Product grokassembly InternalName Microsoft.Extensions.Configuration.FileExtensions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Configuration.FileExtensions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Configuration.FileExtensions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.FileExtensions.dll MD5: 3604168610204920999aeb27fa52ce14 SHA1: 5ad4642c871d47e022080f5c707da159b432efe7 SHA256: 9f67d13f6ff5b463736821793d4e218134a51caf3ce8ebe205fd9801db3735d1 Microsoft.Extensions.Configuration.FileExtensions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.FileExtensions.dll MD5: 3604168610204920999aeb27fa52ce14 SHA1: 5ad4642c871d47e022080f5c707da159b432efe7 SHA256: 9f67d13f6ff5b463736821793d4e218134a51caf3ce8ebe205fd9801db3735d1 Microsoft.Extensions.Configuration.Json.dllDescription:
Microsoft.Extensions.Configuration.Json
JSON configuration provider implementation for Microsoft.Extensions.Configuration. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Json.dllMD5: f632ba94ae101b3a171d59801a2d5c19SHA1: 182a3cdc49febc6ce3f96056c399af1311129af7SHA256: 476f3fcb02d6c48705c4ab43223d08c42f9b5e2e2ead7e811de2cbdb847ebd34
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor dll namespace Microsoft.Extensions.Configuration.Json Highest Vendor file name Microsoft.Extensions.Configuration.Json High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Configuration.Json Low Vendor grokassembly InternalName Microsoft.Extensions.Configuration.Json.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Configuration.Json.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Configuration Highest Product dll namespace Microsoft.Extensions.Configuration.Json Highest Product file name Microsoft.Extensions.Configuration.Json High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Configuration.Json High Product grokassembly InternalName Microsoft.Extensions.Configuration.Json.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Configuration.Json.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Configuration.Json.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Json.dll MD5: f632ba94ae101b3a171d59801a2d5c19 SHA1: 182a3cdc49febc6ce3f96056c399af1311129af7 SHA256: 476f3fcb02d6c48705c4ab43223d08c42f9b5e2e2ead7e811de2cbdb847ebd34 Microsoft.Extensions.Configuration.Json.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Json.dll MD5: f632ba94ae101b3a171d59801a2d5c19 SHA1: 182a3cdc49febc6ce3f96056c399af1311129af7 SHA256: 476f3fcb02d6c48705c4ab43223d08c42f9b5e2e2ead7e811de2cbdb847ebd34 Microsoft.Extensions.Configuration.Json:6.0.0File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Configuration.Json Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Configuration.Json Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Configuration.Json Medium Product msbuild id Microsoft.Extensions.Configuration.Json Highest Version msbuild version 6.0.0 Highest
Related Dependencies Microsoft.Extensions.Configuration.Json:6.0.0File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Microsoft.Extensions.Configuration.Json@6.0.0 Microsoft.Extensions.Configuration.dllDescription:
Microsoft.Extensions.Configuration
Implementation of key-value pair based configuration for Microsoft.Extensions.Configuration. Includes the memory configuration provider. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dllMD5: 2607271d374e06d794599b10cb1a9f8cSHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eecSHA256: 567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Configuration Highest Vendor file name Microsoft.Extensions.Configuration High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Configuration Low Vendor grokassembly InternalName Microsoft.Extensions.Configuration.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Configuration.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Configuration Highest Product file name Microsoft.Extensions.Configuration High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Configuration High Product grokassembly InternalName Microsoft.Extensions.Configuration.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Configuration.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version AssemblyAnalyzer FilteredVersion 6.0.3 Highest
Related Dependencies Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dll MD5: 2607271d374e06d794599b10cb1a9f8c SHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eec SHA256: 567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1 Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dll MD5: 2607271d374e06d794599b10cb1a9f8c SHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eec SHA256: 567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1 Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dll MD5: 2607271d374e06d794599b10cb1a9f8c SHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eec SHA256: 567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1 Microsoft.Extensions.Configuration.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dll MD5: 2607271d374e06d794599b10cb1a9f8c SHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eec SHA256: 567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1 Microsoft.Extensions.Configuration:6.0.1File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Configuration Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Configuration Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Configuration Medium Product msbuild id Microsoft.Extensions.Configuration Highest Version msbuild version 6.0.1 Highest
Related Dependencies Microsoft.Extensions.Configuration:6.0.1File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Microsoft.Extensions.Configuration@6.0.1 Microsoft.Extensions.Configuration:6.0.1File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Microsoft.Extensions.Configuration@6.0.1 Microsoft.Extensions.DependencyInjection.Abstractions.dllDescription:
Microsoft.Extensions.DependencyInjection.Abstractions
Abstractions for dependency injection.
Commonly Used Types:
Microsoft.Extensions.DependencyInjection.IServiceCollection File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.Abstractions.dllMD5: d6cfda4e1c948aeb3e5d57376334375fSHA1: cb8c35306afd15358104ecfe70e724ad9c753e6fSHA256: 9ccd830351aa28bc683d4f8d1cefd9e724161f972d25bfb64eee5bf55c48c5e3
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.DependencyInjection Highest Vendor file name Microsoft.Extensions.DependencyInjection.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.DependencyInjection.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.DependencyInjection.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.DependencyInjection.Abstractions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.DependencyInjection Highest Product file name Microsoft.Extensions.DependencyInjection.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.DependencyInjection.Abstractions High Product grokassembly InternalName Microsoft.Extensions.DependencyInjection.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.DependencyInjection.Abstractions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.DependencyInjection.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.Abstractions.dll MD5: d6cfda4e1c948aeb3e5d57376334375f SHA1: cb8c35306afd15358104ecfe70e724ad9c753e6f SHA256: 9ccd830351aa28bc683d4f8d1cefd9e724161f972d25bfb64eee5bf55c48c5e3 Microsoft.Extensions.DependencyInjection.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.Abstractions.dll MD5: d6cfda4e1c948aeb3e5d57376334375f SHA1: cb8c35306afd15358104ecfe70e724ad9c753e6f SHA256: 9ccd830351aa28bc683d4f8d1cefd9e724161f972d25bfb64eee5bf55c48c5e3 Microsoft.Extensions.DependencyInjection.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.Abstractions.dll MD5: d6cfda4e1c948aeb3e5d57376334375f SHA1: cb8c35306afd15358104ecfe70e724ad9c753e6f SHA256: 9ccd830351aa28bc683d4f8d1cefd9e724161f972d25bfb64eee5bf55c48c5e3 Microsoft.Extensions.DependencyInjection.dllDescription:
Microsoft.Extensions.DependencyInjection
Default implementation of dependency injection for Microsoft.Extensions.DependencyInjection. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dllMD5: f5fc619ac21d262950da7f5332384bf3SHA1: 6823e8981cdaff3dd3de262094915a7661e2996dSHA256: 13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.DependencyInjection Highest Vendor file name Microsoft.Extensions.DependencyInjection High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.DependencyInjection Low Vendor grokassembly InternalName Microsoft.Extensions.DependencyInjection.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.DependencyInjection.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.DependencyInjection Highest Product file name Microsoft.Extensions.DependencyInjection High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.DependencyInjection High Product grokassembly InternalName Microsoft.Extensions.DependencyInjection.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.DependencyInjection.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version AssemblyAnalyzer FilteredVersion 6.0.10 Highest
Related Dependencies Microsoft.Extensions.DependencyInjection.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dll MD5: f5fc619ac21d262950da7f5332384bf3 SHA1: 6823e8981cdaff3dd3de262094915a7661e2996d SHA256: 13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001 Microsoft.Extensions.DependencyInjection.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dll MD5: f5fc619ac21d262950da7f5332384bf3 SHA1: 6823e8981cdaff3dd3de262094915a7661e2996d SHA256: 13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001 Microsoft.Extensions.DependencyInjection.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dll MD5: f5fc619ac21d262950da7f5332384bf3 SHA1: 6823e8981cdaff3dd3de262094915a7661e2996d SHA256: 13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001 Microsoft.Extensions.DependencyInjection.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dll MD5: f5fc619ac21d262950da7f5332384bf3 SHA1: 6823e8981cdaff3dd3de262094915a7661e2996d SHA256: 13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001 Microsoft.Extensions.DependencyModel.dllDescription:
Microsoft.Extensions.DependencyModel
Abstractions for reading `.deps` files.
Commonly Used Types:
Microsoft.Extensions.DependencyModel.DependencyContext File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyModel.dllMD5: b0b997723e8a50f98f8ee30975338117SHA1: 9ef5542d260d0123c62e50006cd4b433feaf4626SHA256: b6406254657a68f84df707987a9319dafbd2e8681fd2e384f3c7ee5883510078
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.DependencyModel Highest Vendor file name Microsoft.Extensions.DependencyModel High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.DependencyModel Low Vendor grokassembly InternalName Microsoft.Extensions.DependencyModel.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.DependencyModel.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.DependencyModel Highest Product file name Microsoft.Extensions.DependencyModel High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.DependencyModel High Product grokassembly InternalName Microsoft.Extensions.DependencyModel.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.DependencyModel.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Microsoft.Extensions.DependencyModel.dllDescription:
Abstractions for reading `.deps` files. File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyModel.dllMD5: 13f8831d108ed271d068990df780dac7SHA1: 8ea6b66104aff050ecaf5be489caee177987f56bSHA256: 7577357b33958c973cc296030ca19a06914100dc320fa1c7e985b06dfbec8df3
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.DependencyModel Highest Vendor file name Microsoft.Extensions.DependencyModel High Vendor grokassembly InternalName Microsoft.Extensions.DependencyModel.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.DependencyModel.dll Low Product dll namespace Microsoft.Extensions.DependencyModel Highest Product file name Microsoft.Extensions.DependencyModel High Product grokassembly InternalName Microsoft.Extensions.DependencyModel.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.DependencyModel.dll Medium Version AssemblyAnalyzer FilteredVersion 1.0.1 Highest
Microsoft.Extensions.FileProviders.Abstractions.dllDescription:
Microsoft.Extensions.FileProviders.Abstractions
Abstractions of files and directories.
Commonly Used Types:
Microsoft.Extensions.FileProviders.IDirectoryContents
Microsoft.Extensions.FileProviders.IFileInfo
Microsoft.Extensions.FileProviders.IFileProvider File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dllMD5: 3644e5e1981b0bde71ed60f5e3754ffbSHA1: 3029f45a1397291b4e7eee9db9b5dcde5a47ab7dSHA256: ecfcef11c42fa4ad5cf2d4d7f553c8f0017e5eb7a4a9b032b4d0505c98ef4ef4
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.FileProviders Highest Vendor file name Microsoft.Extensions.FileProviders.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.FileProviders.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.FileProviders.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Abstractions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.FileProviders Highest Product file name Microsoft.Extensions.FileProviders.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.FileProviders.Abstractions High Product grokassembly InternalName Microsoft.Extensions.FileProviders.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Abstractions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.FileProviders.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dll MD5: 3644e5e1981b0bde71ed60f5e3754ffb SHA1: 3029f45a1397291b4e7eee9db9b5dcde5a47ab7d SHA256: ecfcef11c42fa4ad5cf2d4d7f553c8f0017e5eb7a4a9b032b4d0505c98ef4ef4 Microsoft.Extensions.FileProviders.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dll MD5: 3644e5e1981b0bde71ed60f5e3754ffb SHA1: 3029f45a1397291b4e7eee9db9b5dcde5a47ab7d SHA256: ecfcef11c42fa4ad5cf2d4d7f553c8f0017e5eb7a4a9b032b4d0505c98ef4ef4 Microsoft.Extensions.FileProviders.Abstractions.dllDescription:
Microsoft.Extensions.FileProviders.Abstractions
Abstractions of files and directories.
Commonly used types:
Microsoft.Extensions.FileProviders.IDirectoryContents
Microsoft.Extensions.FileProviders.IFileInfo
Microsoft.Extensions.FileProviders.IFileProvider File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dllMD5: 25394afea2d4cb8f8d77e4c916bbc89bSHA1: 0c66003e39b6f6f279041d0b02a53b42f10a8f9dSHA256: 5a6116fd240c281159ea2064083edde1b7e12287da3943a8cf94da2344af9685
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.FileProviders Highest Vendor file name Microsoft.Extensions.FileProviders.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.Extensions.FileProviders.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.FileProviders.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Abstractions.dll Low Vendor grokassembly ProductName Microsoft .NET Extensions Medium Product dll namespace Microsoft.Extensions.FileProviders Highest Product file name Microsoft.Extensions.FileProviders.Abstractions High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.Extensions.FileProviders.Abstractions High Product grokassembly InternalName Microsoft.Extensions.FileProviders.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Abstractions.dll Medium Product grokassembly ProductName Microsoft .NET Extensions Highest Version AssemblyAnalyzer FilteredVersion 2.0.1 Highest
Microsoft.Extensions.FileProviders.Physical.dllDescription:
Microsoft.Extensions.FileProviders.Physical
File provider for physical files for Microsoft.Extensions.FileProviders. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Physical.dllMD5: 16b277856e7168ca27e32cbf0112eaafSHA1: 616a44c9b1b0d4d6ad6ad37b41556a6e727cc3e5SHA256: b17ba3bc63190e004167d1ea7dc12af57b0cd29bf0ca13edeb4340f6a2c3cc62
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.FileProviders Highest Vendor dll namespace Microsoft.Extensions.FileProviders.Physical Highest Vendor file name Microsoft.Extensions.FileProviders.Physical High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.FileProviders.Physical Low Vendor grokassembly InternalName Microsoft.Extensions.FileProviders.Physical.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Physical.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.FileProviders Highest Product dll namespace Microsoft.Extensions.FileProviders.Physical Highest Product file name Microsoft.Extensions.FileProviders.Physical High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.FileProviders.Physical High Product grokassembly InternalName Microsoft.Extensions.FileProviders.Physical.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.FileProviders.Physical.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.FileProviders.Physical.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Physical.dll MD5: 16b277856e7168ca27e32cbf0112eaaf SHA1: 616a44c9b1b0d4d6ad6ad37b41556a6e727cc3e5 SHA256: b17ba3bc63190e004167d1ea7dc12af57b0cd29bf0ca13edeb4340f6a2c3cc62 Microsoft.Extensions.FileProviders.Physical.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Physical.dll MD5: 16b277856e7168ca27e32cbf0112eaaf SHA1: 616a44c9b1b0d4d6ad6ad37b41556a6e727cc3e5 SHA256: b17ba3bc63190e004167d1ea7dc12af57b0cd29bf0ca13edeb4340f6a2c3cc62 Microsoft.Extensions.FileSystemGlobbing.dllDescription:
Microsoft.Extensions.FileSystemGlobbing
File system globbing to find files matching a specified pattern. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileSystemGlobbing.dllMD5: 35af9a93caeb8e69c1b41c99ed74b4f5SHA1: e0f87d149cb7a7bd30ec407f801f4ea4fa210f12SHA256: be2897386d1fc215a86d3d1343564e262641751bd846559b0ed8f3fba77cb102
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.FileSystemGlobbing Highest Vendor file name Microsoft.Extensions.FileSystemGlobbing High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.FileSystemGlobbing Low Vendor grokassembly InternalName Microsoft.Extensions.FileSystemGlobbing.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.FileSystemGlobbing.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.FileSystemGlobbing Highest Product file name Microsoft.Extensions.FileSystemGlobbing High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.FileSystemGlobbing High Product grokassembly InternalName Microsoft.Extensions.FileSystemGlobbing.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.FileSystemGlobbing.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.FileSystemGlobbing.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileSystemGlobbing.dll MD5: 35af9a93caeb8e69c1b41c99ed74b4f5 SHA1: e0f87d149cb7a7bd30ec407f801f4ea4fa210f12 SHA256: be2897386d1fc215a86d3d1343564e262641751bd846559b0ed8f3fba77cb102 Microsoft.Extensions.FileSystemGlobbing.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileSystemGlobbing.dll MD5: 35af9a93caeb8e69c1b41c99ed74b4f5 SHA1: e0f87d149cb7a7bd30ec407f801f4ea4fa210f12 SHA256: be2897386d1fc215a86d3d1343564e262641751bd846559b0ed8f3fba77cb102 Microsoft.Extensions.Hosting.Abstractions.dllDescription:
Microsoft.Extensions.Hosting.Abstractions
.NET Core hosting and startup abstractions for applications. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Hosting.Abstractions.dllMD5: 11fd3e7f5dcb45e347e70b4e94db2a00SHA1: 075ae0367fd7707fa2a35aba38089f119ef20b24SHA256: 71b4f978afcce58ae5ca51e9c1b6c4c7c54b42f8ebe7fc69be72854e51fa7ba6
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Hosting Highest Vendor file name Microsoft.Extensions.Hosting.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.Extensions.Hosting.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.Hosting.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Hosting.Abstractions.dll Low Vendor grokassembly ProductName Microsoft ASP.NET Core Medium Product dll namespace Microsoft.Extensions.Hosting Highest Product file name Microsoft.Extensions.Hosting.Abstractions High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.Extensions.Hosting.Abstractions High Product grokassembly InternalName Microsoft.Extensions.Hosting.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Hosting.Abstractions.dll Medium Product grokassembly ProductName Microsoft ASP.NET Core Highest Version AssemblyAnalyzer FilteredVersion 2.0.3 Highest
Related Dependencies Microsoft.Extensions.Hosting.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Hosting.Abstractions.dll MD5: 11fd3e7f5dcb45e347e70b4e94db2a00 SHA1: 075ae0367fd7707fa2a35aba38089f119ef20b24 SHA256: 71b4f978afcce58ae5ca51e9c1b6c4c7c54b42f8ebe7fc69be72854e51fa7ba6 Microsoft.Extensions.Hosting.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Hosting.Abstractions.dll MD5: 11fd3e7f5dcb45e347e70b4e94db2a00 SHA1: 075ae0367fd7707fa2a35aba38089f119ef20b24 SHA256: 71b4f978afcce58ae5ca51e9c1b6c4c7c54b42f8ebe7fc69be72854e51fa7ba6 Microsoft.Extensions.Hosting.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Hosting.Abstractions.dll MD5: 11fd3e7f5dcb45e347e70b4e94db2a00 SHA1: 075ae0367fd7707fa2a35aba38089f119ef20b24 SHA256: 71b4f978afcce58ae5ca51e9c1b6c4c7c54b42f8ebe7fc69be72854e51fa7ba6 Microsoft.Extensions.Hosting:3.1.3File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Hosting Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Hosting Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Hosting Medium Product msbuild id Microsoft.Extensions.Hosting Highest Version msbuild version 3.1.3 Highest
Microsoft.Extensions.Logging.Abstractions.dllDescription:
Microsoft.Extensions.Logging.Abstractions
Logging abstractions for Microsoft.Extensions.Logging.
Commonly Used Types:
Microsoft.Extensions.Logging.ILogger
Microsoft.Extensions.Logging.ILoggerFactory
Microsoft.Extensions.Logging.ILogger<TCategoryName>
Microsoft.Extensions.Logging.LogLevel
Microsoft.Extensions.Logging.Logger<T>
Microsoft.Extensions.Logging.LoggerMessage
Microsoft.Extensions.Logging.Abstractions.NullLogger File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dllMD5: 2d352734d0b1b60b04f29be9f21189b2SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826SHA256: c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Logging Highest Vendor dll namespace Microsoft.Extensions.Logging.Abstractions Highest Vendor file name Microsoft.Extensions.Logging.Abstractions High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Logging.Abstractions Low Vendor grokassembly InternalName Microsoft.Extensions.Logging.Abstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Logging.Abstractions.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Logging Highest Product dll namespace Microsoft.Extensions.Logging.Abstractions Highest Product file name Microsoft.Extensions.Logging.Abstractions High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Logging.Abstractions High Product grokassembly InternalName Microsoft.Extensions.Logging.Abstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Logging.Abstractions.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version AssemblyAnalyzer FilteredVersion 6.0.3 Highest
Related Dependencies Microsoft.Extensions.Logging.Abstractions.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dll MD5: 2d352734d0b1b60b04f29be9f21189b2 SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826 SHA256: c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da Microsoft.Extensions.Logging.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dll MD5: 2d352734d0b1b60b04f29be9f21189b2 SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826 SHA256: c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da Microsoft.Extensions.Logging.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dll MD5: 2d352734d0b1b60b04f29be9f21189b2 SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826 SHA256: c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da Microsoft.Extensions.Logging.Abstractions.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dll MD5: 2d352734d0b1b60b04f29be9f21189b2 SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826 SHA256: c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da Microsoft.Extensions.Logging.Abstractions:6.0.1File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Logging.Abstractions Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Logging.Abstractions Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Logging.Abstractions Medium Product msbuild id Microsoft.Extensions.Logging.Abstractions Highest Version msbuild version 6.0.1 Highest
Microsoft.Extensions.Logging.dllDescription:
Microsoft.Extensions.Logging
Logging infrastructure default implementation for Microsoft.Extensions.Logging. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Logging.dllMD5: 037fa19d37892f003cb18c3f4f070b66SHA1: 7bea9201a90f69ff958f5bf64e959d1e4021f252SHA256: 183650081b551dfad967a7cbf79946a229cb79458b8d04a12db7c44b03bb9ab7
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Logging Highest Vendor file name Microsoft.Extensions.Logging High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Logging Low Vendor grokassembly InternalName Microsoft.Extensions.Logging.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Logging.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Logging Highest Product file name Microsoft.Extensions.Logging High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Logging High Product grokassembly InternalName Microsoft.Extensions.Logging.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Logging.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Logging.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.dll MD5: 037fa19d37892f003cb18c3f4f070b66 SHA1: 7bea9201a90f69ff958f5bf64e959d1e4021f252 SHA256: 183650081b551dfad967a7cbf79946a229cb79458b8d04a12db7c44b03bb9ab7 Microsoft.Extensions.Logging.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.dll MD5: 037fa19d37892f003cb18c3f4f070b66 SHA1: 7bea9201a90f69ff958f5bf64e959d1e4021f252 SHA256: 183650081b551dfad967a7cbf79946a229cb79458b8d04a12db7c44b03bb9ab7 Microsoft.Extensions.Logging.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Logging.dll MD5: 037fa19d37892f003cb18c3f4f070b66 SHA1: 7bea9201a90f69ff958f5bf64e959d1e4021f252 SHA256: 183650081b551dfad967a7cbf79946a229cb79458b8d04a12db7c44b03bb9ab7 Microsoft.Extensions.Logging:6.0.0File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Extensions Low Vendor msbuild id Extensions.Logging Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.Logging Medium Product msbuild id Extensions Medium Product msbuild id Extensions.Logging Medium Product msbuild id Microsoft.Extensions.Logging Highest Version msbuild version 6.0.0 Highest
Related Dependencies Microsoft.Extensions.Logging:6.0.0File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Microsoft.Extensions.Logging@6.0.0 Microsoft.Extensions.Options.dllDescription:
Microsoft.Extensions.Options
Provides a strongly typed way of specifying and accessing settings using dependency injection. File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Options.dllMD5: 950440793a182cc76ffc7f7280e55dafSHA1: 6ec0c1fe1332912086247080b55b06623c78326eSHA256: 786112cb2f6646ef1170219a8c0bb813c9f14a6781e67c6266414f55a679565d
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Options Highest Vendor file name Microsoft.Extensions.Options High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Options Low Vendor grokassembly InternalName Microsoft.Extensions.Options.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Options.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Options Highest Product file name Microsoft.Extensions.Options High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Options High Product grokassembly InternalName Microsoft.Extensions.Options.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Options.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Options.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Options.dll MD5: 950440793a182cc76ffc7f7280e55daf SHA1: 6ec0c1fe1332912086247080b55b06623c78326e SHA256: 786112cb2f6646ef1170219a8c0bb813c9f14a6781e67c6266414f55a679565d Microsoft.Extensions.Options.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Options.dll MD5: 950440793a182cc76ffc7f7280e55daf SHA1: 6ec0c1fe1332912086247080b55b06623c78326e SHA256: 786112cb2f6646ef1170219a8c0bb813c9f14a6781e67c6266414f55a679565d Microsoft.Extensions.Options.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Options.dll MD5: 950440793a182cc76ffc7f7280e55daf SHA1: 6ec0c1fe1332912086247080b55b06623c78326e SHA256: 786112cb2f6646ef1170219a8c0bb813c9f14a6781e67c6266414f55a679565d Microsoft.Extensions.PlatformAbstractions.dllDescription:
Abstractions that unify behavior and API across .NET Framework, .NET Core and Mono File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.PlatformAbstractions.dllMD5: aa4d6950dcb5906324f8d7a8f72c4639SHA1: 1f9251a7ad5accf0530552a7970962ed91f583d6SHA256: d4f515a2f586bf503a61a41e9b91417884241fa031b08dba1cda715235207b7e
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.PlatformAbstractions Highest Vendor file name Microsoft.Extensions.PlatformAbstractions High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly InternalName Microsoft.Extensions.PlatformAbstractions.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.PlatformAbstractions.dll Low Vendor grokassembly ProductName Microsoft .NET Extensions Medium Vendor msbuild id Extensions Low Vendor msbuild id Extensions.PlatformAbstractions Low Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.Extensions.PlatformAbstractions Medium Product dll namespace Microsoft.Extensions.PlatformAbstractions Highest Product file name Microsoft.Extensions.PlatformAbstractions High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly InternalName Microsoft.Extensions.PlatformAbstractions.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.PlatformAbstractions.dll Medium Product grokassembly ProductName Microsoft .NET Extensions Highest Product msbuild id Extensions Medium Product msbuild id Extensions.PlatformAbstractions Medium Product msbuild id Microsoft.Extensions.PlatformAbstractions Highest Version AssemblyAnalyzer FilteredVersion 1.1.0 Highest Version msbuild version 1.1.0 Highest
Related Dependencies Microsoft.Extensions.PlatformAbstractions:1.1.0File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/Microsoft.Extensions.PlatformAbstractions@1.1.0 Microsoft.Extensions.Primitives.dllDescription:
Microsoft.Extensions.Primitives
Primitives shared by framework extensions. Commonly used types include:
Commonly Used Types:
Microsoft.Extensions.Primitives.IChangeToken
Microsoft.Extensions.Primitives.StringValues
Microsoft.Extensions.Primitives.StringSegment File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Primitives.dllMD5: a53d11973f75b15bef19c16a35ffb432SHA1: 376636c20cee083da54d4146479032170ec7231bSHA256: 8ce9a85927ec7507b11ffe90080e7a811d51304a9e8b1da20c350159ba403902
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.Extensions.Primitives Highest Vendor file name Microsoft.Extensions.Primitives High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.Extensions.Primitives Low Vendor grokassembly InternalName Microsoft.Extensions.Primitives.dll Low Vendor grokassembly OriginalFilename Microsoft.Extensions.Primitives.dll Low Vendor grokassembly ProductName Microsoft® .NET Medium Product dll namespace Microsoft.Extensions.Primitives Highest Product file name Microsoft.Extensions.Primitives High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.Extensions.Primitives High Product grokassembly InternalName Microsoft.Extensions.Primitives.dll Medium Product grokassembly OriginalFilename Microsoft.Extensions.Primitives.dll Medium Product grokassembly ProductName Microsoft® .NET Highest Version grokassembly FileVersion 6.0.21.52210 High
Related Dependencies Microsoft.Extensions.Primitives.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.Primitives.dll MD5: a53d11973f75b15bef19c16a35ffb432 SHA1: 376636c20cee083da54d4146479032170ec7231b SHA256: 8ce9a85927ec7507b11ffe90080e7a811d51304a9e8b1da20c350159ba403902 Microsoft.Extensions.Primitives.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.Primitives.dll MD5: a53d11973f75b15bef19c16a35ffb432 SHA1: 376636c20cee083da54d4146479032170ec7231b SHA256: 8ce9a85927ec7507b11ffe90080e7a811d51304a9e8b1da20c350159ba403902 Microsoft.Extensions.Primitives.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.Primitives.dll MD5: a53d11973f75b15bef19c16a35ffb432 SHA1: 376636c20cee083da54d4146479032170ec7231b SHA256: 8ce9a85927ec7507b11ffe90080e7a811d51304a9e8b1da20c350159ba403902 Microsoft.IdentityModel.JsonWebTokens.dllDescription:
Microsoft.IdentityModel.JsonWebTokens
Includes types that provide support for creating, serializing and validating JSON Web Tokens. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dllMD5: 627b852a21fe33f452dfad41e0b422f7SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9SHA256: 4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.IdentityModel.JsonWebTokens Highest Vendor file name Microsoft.IdentityModel.JsonWebTokens High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.IdentityModel.JsonWebTokens Low Vendor grokassembly InternalName Microsoft.IdentityModel.JsonWebTokens.dll Low Vendor grokassembly OriginalFilename Microsoft.IdentityModel.JsonWebTokens.dll Low Vendor grokassembly ProductName Microsoft IdentityModel Medium Product dll namespace Microsoft.IdentityModel.JsonWebTokens Highest Product file name Microsoft.IdentityModel.JsonWebTokens High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.IdentityModel.JsonWebTokens High Product grokassembly InternalName Microsoft.IdentityModel.JsonWebTokens.dll Medium Product grokassembly OriginalFilename Microsoft.IdentityModel.JsonWebTokens.dll Medium Product grokassembly ProductName Microsoft IdentityModel Highest Version AssemblyAnalyzer FilteredVersion 5.6.0.61018 Highest Version grokassembly FileVersion 5.6.0.61018 High
Related Dependencies Microsoft.IdentityModel.JsonWebTokens.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dll MD5: 627b852a21fe33f452dfad41e0b422f7 SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9 SHA256: 4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696 Microsoft.IdentityModel.JsonWebTokens.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dll MD5: 627b852a21fe33f452dfad41e0b422f7 SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9 SHA256: 4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696 Microsoft.IdentityModel.JsonWebTokens.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dll MD5: 627b852a21fe33f452dfad41e0b422f7 SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9 SHA256: 4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696 Microsoft.IdentityModel.JsonWebTokens.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dll MD5: 627b852a21fe33f452dfad41e0b422f7 SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9 SHA256: 4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696 pkg:generic/Microsoft.IdentityModel.JsonWebTokens@5.6.0.61018 (Confidence :Medium)cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:json_web_token_project:json_web_token:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress CVE-2024-21319 suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation, NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
Microsoft.IdentityModel.Protocols.OpenIdConnect.dllDescription:
Microsoft.IdentityModel.Protocols.OpenIdConnect
Includes types that provide support for OpenIdConnect protocol. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Protocols.OpenIdConnect.dllMD5: 798c630436e7a44b6cd619e1da2c3fdfSHA1: 4690c4ea6a8133a55e3f4e5f8cd0f5912050082fSHA256: 19b5ed3bd950a0ff92b27b3e471af561fa2a15161cd9c5f8abddceb2dc4b3848
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.IdentityModel.Protocols.OpenIdConnect Highest Vendor file name Microsoft.IdentityModel.Protocols.OpenIdConnect High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.IdentityModel.Protocols.OpenIdConnect Low Vendor grokassembly InternalName Microsoft.IdentityModel.Protocols.OpenIdConnect.dll Low Vendor grokassembly OriginalFilename Microsoft.IdentityModel.Protocols.OpenIdConnect.dll Low Vendor grokassembly ProductName Microsoft IdentityModel Medium Product dll namespace Microsoft.IdentityModel.Protocols.OpenIdConnect Highest Product file name Microsoft.IdentityModel.Protocols.OpenIdConnect High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.IdentityModel.Protocols.OpenIdConnect High Product grokassembly InternalName Microsoft.IdentityModel.Protocols.OpenIdConnect.dll Medium Product grokassembly OriginalFilename Microsoft.IdentityModel.Protocols.OpenIdConnect.dll Medium Product grokassembly ProductName Microsoft IdentityModel Highest Version AssemblyAnalyzer FilteredVersion 5.5.0.60624 Highest Version grokassembly FileVersion 5.5.0.60624 High
CVE-2024-21319 suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation, NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
Microsoft.IdentityModel.Protocols.dllDescription:
Microsoft.IdentityModel.Protocols
Provides base protocol support for OpenIdConnect and WsFederation. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Protocols.dllMD5: 9be0a192beff00f0824fadfe06e378e7SHA1: 74e00a65d15440e81d70a1e0288a7bc6e3d176dcSHA256: 20396d1864b00446cb8da5ea0cc6b447a40bb715591122c4dfa3eedb695b8409
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.IdentityModel.Protocols Highest Vendor file name Microsoft.IdentityModel.Protocols High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.IdentityModel.Protocols Low Vendor grokassembly InternalName Microsoft.IdentityModel.Protocols.dll Low Vendor grokassembly OriginalFilename Microsoft.IdentityModel.Protocols.dll Low Vendor grokassembly ProductName Microsoft IdentityModel Medium Product dll namespace Microsoft.IdentityModel.Protocols Highest Product file name Microsoft.IdentityModel.Protocols High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.IdentityModel.Protocols High Product grokassembly InternalName Microsoft.IdentityModel.Protocols.dll Medium Product grokassembly OriginalFilename Microsoft.IdentityModel.Protocols.dll Medium Product grokassembly ProductName Microsoft IdentityModel Highest Version AssemblyAnalyzer FilteredVersion 5.5.0.60624 Highest Version grokassembly FileVersion 5.5.0.60624 High
pkg:generic/Microsoft.IdentityModel.Protocols@5.5.0.60624 (Confidence :Medium)cpe:2.3:a:identitymodel_project:identitymodel:5.5.0.60624:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identity_model:5.5.0.60624:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identitymodel:5.5.0.60624:*:*:*:*:*:*:* (Confidence :Low) suppress CVE-2024-21319 suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation, NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
Microsoft.IdentityModel.Tokens.dllDescription:
Microsoft.IdentityModel.Tokens
Includes types that provide support for SecurityTokens, Cryptographic operations: Signing, Verifying Signatures, Encryption. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dllMD5: 4ed422e1d4b93851a08b340de68fccf5SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3SHA256: cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.IdentityModel.Tokens Highest Vendor file name Microsoft.IdentityModel.Tokens High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription Microsoft.IdentityModel.Tokens Low Vendor grokassembly InternalName Microsoft.IdentityModel.Tokens.dll Low Vendor grokassembly OriginalFilename Microsoft.IdentityModel.Tokens.dll Low Vendor grokassembly ProductName Microsoft IdentityModel Medium Product dll namespace Microsoft.IdentityModel.Tokens Highest Product file name Microsoft.IdentityModel.Tokens High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription Microsoft.IdentityModel.Tokens High Product grokassembly InternalName Microsoft.IdentityModel.Tokens.dll Medium Product grokassembly OriginalFilename Microsoft.IdentityModel.Tokens.dll Medium Product grokassembly ProductName Microsoft IdentityModel Highest Version AssemblyAnalyzer FilteredVersion 5.6.0.61018 Highest Version grokassembly FileVersion 5.6.0.61018 High
Related Dependencies Microsoft.IdentityModel.Logging.dllFile Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Logging.dll MD5: 58ca6bade440d2181f2ee8ca602e6a6c SHA1: d28a11cf993578c54ac1652fef3e34fa8fe57509 SHA256: 5805dbef5dc49f8a30810182f1d1e6de3d12f6d4a00292f492017eb9641fc159 pkg:generic/Microsoft.IdentityModel.Logging@5.6.0.61018 Microsoft.IdentityModel.Logging.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.IdentityModel.Logging.dll MD5: 58ca6bade440d2181f2ee8ca602e6a6c SHA1: d28a11cf993578c54ac1652fef3e34fa8fe57509 SHA256: 5805dbef5dc49f8a30810182f1d1e6de3d12f6d4a00292f492017eb9641fc159 Microsoft.IdentityModel.Logging.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Logging.dll MD5: 58ca6bade440d2181f2ee8ca602e6a6c SHA1: d28a11cf993578c54ac1652fef3e34fa8fe57509 SHA256: 5805dbef5dc49f8a30810182f1d1e6de3d12f6d4a00292f492017eb9641fc159 Microsoft.IdentityModel.Logging.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Logging.dll MD5: 58ca6bade440d2181f2ee8ca602e6a6c SHA1: d28a11cf993578c54ac1652fef3e34fa8fe57509 SHA256: 5805dbef5dc49f8a30810182f1d1e6de3d12f6d4a00292f492017eb9641fc159 Microsoft.IdentityModel.Logging.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Logging.dll MD5: 58ca6bade440d2181f2ee8ca602e6a6c SHA1: d28a11cf993578c54ac1652fef3e34fa8fe57509 SHA256: 5805dbef5dc49f8a30810182f1d1e6de3d12f6d4a00292f492017eb9641fc159 Microsoft.IdentityModel.Tokens.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dll MD5: 4ed422e1d4b93851a08b340de68fccf5 SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3 SHA256: cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e Microsoft.IdentityModel.Tokens.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dll MD5: 4ed422e1d4b93851a08b340de68fccf5 SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3 SHA256: cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e Microsoft.IdentityModel.Tokens.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dll MD5: 4ed422e1d4b93851a08b340de68fccf5 SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3 SHA256: cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e Microsoft.IdentityModel.Tokens.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dll MD5: 4ed422e1d4b93851a08b340de68fccf5 SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3 SHA256: cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e pkg:generic/Microsoft.IdentityModel.Tokens@5.6.0.61018 (Confidence :Medium)cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress CVE-2024-21319 suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation, NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
Microsoft.NET.Test.Sdk:15.5.0File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.NET.Test.Sdk Medium Vendor msbuild id NET Low Vendor msbuild id NET.Test.Sdk Low Product msbuild id Microsoft.NET.Test.Sdk Highest Product msbuild id NET Medium Product msbuild id NET.Test.Sdk Medium Version msbuild version 15.5.0 Highest
Microsoft.NET.Test.Sdk:15.8.0File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.NET.Test.Sdk Medium Vendor msbuild id NET Low Vendor msbuild id NET.Test.Sdk Low Product msbuild id Microsoft.NET.Test.Sdk Highest Product msbuild id NET Medium Product msbuild id NET.Test.Sdk Medium Version msbuild version 15.8.0 Highest
Microsoft.NET.Test.Sdk:16.5.0File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id Microsoft Medium Vendor msbuild id Microsoft.NET.Test.Sdk Medium Vendor msbuild id NET Low Vendor msbuild id NET.Test.Sdk Low Product msbuild id Microsoft.NET.Test.Sdk Highest Product msbuild id NET Medium Product msbuild id NET.Test.Sdk Medium Version msbuild version 16.5.0 Highest
Microsoft.TestPlatform.CrossPlatEngine.dllDescription:
Microsoft.TestPlatform.CrossPlatEngine File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.TestPlatform.CrossPlatEngine.dllMD5: 01c8f086a764cda2a400c92e67ed5599SHA1: c3fbc29e95bb9fec54e9d62e966f436e95d3f0a1SHA256: 118c7466f1ced94c444ce30084ef5979a99f5c375be61002e31f13bb19fc961c
Evidence Type Source Name Value Confidence Vendor file name Microsoft.TestPlatform.CrossPlatEngine High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.TestPlatform.CrossPlatEngine Low Vendor grokassembly InternalName Microsoft.TestPlatform.CrossPlatEngine.dll Low Vendor grokassembly OriginalFilename Microsoft.TestPlatform.CrossPlatEngine.dll Low Vendor grokassembly ProductName Microsoft.VisualStudio.TestPlatform.CrossPlatEngine Medium Product dll namespace Microsoft.VisualStudio.TestPlatform.CrossPlatEngine Highest Product file name Microsoft.TestPlatform.CrossPlatEngine High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.TestPlatform.CrossPlatEngine High Product grokassembly InternalName Microsoft.TestPlatform.CrossPlatEngine.dll Medium Product grokassembly OriginalFilename Microsoft.TestPlatform.CrossPlatEngine.dll Medium Product grokassembly ProductName Microsoft.VisualStudio.TestPlatform.CrossPlatEngine Highest Version grokassembly FileVersion 15.0.0 High
Related Dependencies Microsoft.TestPlatform.CrossPlatEngine.resources.dllDescription:
Microsoft.TestPlatform.CrossPlatEngine File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\cs\Microsoft.TestPlatform.CrossPlatEngine.resources.dllMD5: eaf091e4308b282336ea394404e2120eSHA1: 00e5bd4e631a6932ac12ea9e234299da6075c47cSHA256: e092db6e9db5b34167b44e4b9d17239977e0c0b6a0ffde5a6294031ce13d8e5b
Evidence Type Source Name Value Confidence Vendor file name Microsoft.TestPlatform.CrossPlatEngine.resources High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.TestPlatform.CrossPlatEngine Low Vendor grokassembly InternalName Microsoft.TestPlatform.CrossPlatEngine.resources.dll Low Vendor grokassembly OriginalFilename Microsoft.TestPlatform.CrossPlatEngine.resources.dll Low Vendor grokassembly ProductName Microsoft.VisualStudio.TestPlatform.CrossPlatEngine Medium Product file name Microsoft.TestPlatform.CrossPlatEngine.resources High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.TestPlatform.CrossPlatEngine High Product grokassembly InternalName Microsoft.TestPlatform.CrossPlatEngine.resources.dll Medium Product grokassembly OriginalFilename Microsoft.TestPlatform.CrossPlatEngine.resources.dll Medium Product grokassembly ProductName Microsoft.VisualStudio.TestPlatform.CrossPlatEngine Highest Version grokassembly FileVersion 15.0.0 High
Related Dependencies Microsoft.VisualStudio.CodeCoverage.Shim.dllDescription:
Microsoft.VisualStudio.CodeCoverage.Shim.dll
Microsoft.VisualStudio.CodeCoverage.Shim.dll File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dllMD5: a733cde226e183c593ab278fb21f22b2SHA1: 96ccdd267aade97cdc16f9a39fa34fd389764e55SHA256: d8a241ee38f903c0a24356df4c8f83094215182df1e9d9df1c8468453e5b68ab
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.CodeCoverage Highest Vendor file name Microsoft.VisualStudio.CodeCoverage.Shim High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly ProductName Microsoft® Visual Studio® Medium Product dll namespace Microsoft.VisualStudio.CodeCoverage Highest Product file name Microsoft.VisualStudio.CodeCoverage.Shim High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll High Product grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly ProductName Microsoft® Visual Studio® Highest Version AssemblyAnalyzer FilteredVersion 16.0.28223.3002 Highest Version grokassembly FileVersion 16.0.28223.3002 High Version grokassembly ProductVersion 16.0.28223.3002 Highest
Microsoft.VisualStudio.CodeCoverage.Shim.dllDescription:
Microsoft.VisualStudio.CodeCoverage.Shim.dll
Microsoft.VisualStudio.CodeCoverage.Shim.dll File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dllMD5: 1a18c741a726841e30e21c7e847e3206SHA1: 24a8d6fb78b1e27e8c51659b5255b4e950904626SHA256: 3820864cf551ab42ec3cbd5e2e743479c393c8728da58c0849b95b7b6ed7ad70
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.CodeCoverage Highest Vendor file name Microsoft.VisualStudio.CodeCoverage.Shim High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly ProductName Microsoft® Visual Studio® Medium Product dll namespace Microsoft.VisualStudio.CodeCoverage Highest Product file name Microsoft.VisualStudio.CodeCoverage.Shim High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll High Product grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly ProductName Microsoft® Visual Studio® Highest Version AssemblyAnalyzer FilteredVersion 15.0.27718.3008 Highest Version grokassembly FileVersion 15.0.27718.3008 High Version grokassembly ProductVersion 15.0.27718.3008 Highest
Microsoft.VisualStudio.CodeCoverage.Shim.dllDescription:
Microsoft.VisualStudio.CodeCoverage.Shim.dll
Microsoft.VisualStudio.CodeCoverage.Shim.dll File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dllMD5: 18abc24fbcd39e398b03e6ec0dac1d15SHA1: 5232d8f57f098056bed6ef39e927c91f3dd68011SHA256: d7cdd2d3e02ada6de7b99d6795bea37020a3040c1232f253e6fd5785346250c0
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.CodeCoverage Highest Vendor file name Microsoft.VisualStudio.CodeCoverage.Shim High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Low Vendor grokassembly ProductName Microsoft® Visual Studio® Medium Product dll namespace Microsoft.VisualStudio.CodeCoverage Highest Product file name Microsoft.VisualStudio.CodeCoverage.Shim High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription Microsoft.VisualStudio.CodeCoverage.Shim.dll High Product grokassembly InternalName Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.CodeCoverage.Shim.dll Medium Product grokassembly ProductName Microsoft® Visual Studio® Highest Version AssemblyAnalyzer FilteredVersion 15.0.26228.0 Highest Version grokassembly FileVersion 15.0.26228.0 High Version grokassembly ProductVersion 15.0.26228.0 Highest
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllDescription:
PlatformServices.Interface File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllMD5: 3d537dbd003448bedf2cc940a8832645SHA1: 142311338a3ec2959cafe044a04e019324286936SHA256: 62b8e52d58b4ba13a852c3c18ac974e9f269eb0cb5850da3f3dcffe6670c0f03
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface Highest Vendor file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription PlatformServices.Interface Low Vendor grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Low Vendor grokassembly ProductName PlatformServices.Interface Medium Product dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface Highest Product file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription PlatformServices.Interface High Product grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Medium Product grokassembly ProductName PlatformServices.Interface Highest Version AssemblyAnalyzer FilteredVersion 14.0.4503.01 Highest Version grokassembly FileVersion 14.0.4503.01 High Version grokassembly ProductVersion 14.0.4503.01 Highest
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllDescription:
PlatformServices.Interface File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllMD5: 5572e3b8786bcf5f181eac2203553d94SHA1: 6fcb801907e67fd6f91debcdad7988fab9e891a5SHA256: 80df4d091bf9dab0d41aa65d97b2094bf984d4e907c65b32353130931250c3d6
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface Highest Vendor file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface High Vendor grokassembly FileDescription PlatformServices.Interface Low Vendor grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Low Vendor grokassembly ProductName PlatformServices.Interface Medium Product dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface Highest Product file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface High Product grokassembly FileDescription PlatformServices.Interface High Product grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll Medium Product grokassembly ProductName PlatformServices.Interface Highest Version AssemblyAnalyzer FilteredVersion 14.0.2505.01 Highest Version grokassembly FileVersion 14.0.2505.01 High Version grokassembly ProductVersion 14.0.2505.01 Highest
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dllDescription:
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dllMD5: 405b2ab754b354d852c51ab91e5cd575SHA1: 1852468f91317c89187f9866a5ffe4265c688e0aSHA256: 6c3fecb7469357b20f4b8410725497904be939f40a916b3c19aab140eb461099
Evidence Type Source Name Value Confidence Vendor dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Highest Vendor file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices High Vendor grokassembly CompanyName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Highest Vendor grokassembly FileDescription Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Low Vendor grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll Low Vendor grokassembly ProductName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Medium Product dll namespace Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Highest Product file name Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices High Product grokassembly CompanyName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Low Product grokassembly FileDescription Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices High Product grokassembly InternalName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll Medium Product grokassembly ProductName Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices Highest Version grokassembly FileVersion 14.0.0.0 High
Related Dependencies Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll MD5: 165ad66ceb7b53061d5ac683379539de SHA1: 8b328b73ae9c3848b64d33f30bd9dd5fe31bd85d SHA256: 7c1497504b4870a411901c44dba16c17cf626f257aea6c3227921118f007bee8 pkg:generic/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices@14.0.0.0 Microsoft.VisualStudio.TestPlatform.TestFramework.dllDescription:
MSTest.Core File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.TestFramework.dllMD5: 28832f1c14c7956d7e9cf384fb708733SHA1: 9d1a06d157634e2b7f60ab7ca10c67260c720b31SHA256: f3d74b362314092cc918338ec5f3e561dd74b29ba4eb46a2921ba0d3c9753709
Evidence Type Source Name Value Confidence Vendor file name Microsoft.VisualStudio.TestPlatform.TestFramework High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription MSTest.Core Low Vendor grokassembly InternalName Microsoft.VisualStudio.TestPlatform.TestFramework.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.TestFramework.dll Low Vendor grokassembly ProductName MSTest.Core Medium Product file name Microsoft.VisualStudio.TestPlatform.TestFramework High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription MSTest.Core High Product grokassembly InternalName Microsoft.VisualStudio.TestPlatform.TestFramework.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.TestFramework.dll Medium Product grokassembly ProductName MSTest.Core Highest Version AssemblyAnalyzer FilteredVersion 14.0.4503.01 Highest Version grokassembly FileVersion 14.0.4503.01 High Version grokassembly ProductVersion 14.0.4503.01 Highest
Related Dependencies Microsoft.VisualStudio.TestPlatform.MSTest.TestAdapter.dll Microsoft.VisualStudio.TestPlatform.TestFramework.Extensions.dll Microsoft.VisualStudio.TestPlatform.TestFramework.dllDescription:
MSTest.Core File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.TestFramework.dllMD5: 77102e3f0739f48e286125bc91f9c794SHA1: 448feebc568322041520827dbffaa8e89c33d9e8SHA256: ccd11b94c40390a6f1593744a3daabceb39a629783122e23639f35c112874a0e
Evidence Type Source Name Value Confidence Vendor file name Microsoft.VisualStudio.TestPlatform.TestFramework High Vendor grokassembly FileDescription MSTest.Core Low Vendor grokassembly InternalName Microsoft.VisualStudio.TestPlatform.TestFramework.dll Low Vendor grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.TestFramework.dll Low Vendor grokassembly ProductName MSTest.Core Medium Product file name Microsoft.VisualStudio.TestPlatform.TestFramework High Product grokassembly FileDescription MSTest.Core High Product grokassembly InternalName Microsoft.VisualStudio.TestPlatform.TestFramework.dll Medium Product grokassembly OriginalFilename Microsoft.VisualStudio.TestPlatform.TestFramework.dll Medium Product grokassembly ProductName MSTest.Core Highest Version AssemblyAnalyzer FilteredVersion 14.0.2505.01 Highest Version grokassembly FileVersion 14.0.2505.01 High Version grokassembly ProductVersion 14.0.2505.01 Highest
Related Dependencies Microsoft.VisualStudio.TestPlatform.MSTest.TestAdapter.dll Microsoft.VisualStudio.TestPlatform.TestFramework.Extensions.dll Moq.dllDescription:
Moq File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Moq.dllMD5: 29ff764e845264b45abf2086e93a841fSHA1: 4e07e55eacb8077c2b3f7c456eaa31e0f3a81b2cSHA256: ebd008730a851d52fba258188f0e83326faf55b32979725793a043b9d280be18
Evidence Type Source Name Value Confidence Vendor dll namespace Moq Highest Vendor file name Moq High Vendor grokassembly CompanyName Clarius Consulting, Manas Technology Solutions, InSTEDD Highest Vendor grokassembly FileDescription Moq Low Vendor grokassembly InternalName Moq.dll Low Vendor grokassembly OriginalFilename Moq.dll Low Vendor grokassembly ProductName Moq Medium Vendor msbuild id Moq Medium Vendor msbuild id Moq Low Product dll namespace Moq Highest Product file name Moq High Product grokassembly CompanyName Clarius Consulting, Manas Technology Solutions, InSTEDD Low Product grokassembly FileDescription Moq High Product grokassembly InternalName Moq.dll Medium Product grokassembly OriginalFilename Moq.dll Medium Product grokassembly ProductName Moq Highest Product msbuild id Moq Highest Version AssemblyAnalyzer FilteredVersion 4.9.0 Highest Version grokassembly FileVersion 4.9.0 High Version msbuild version 4.9.0 Highest
Related Dependencies Moq:4.9.0File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj pkg:nuget/Moq@4.9.0 Moq.dllDescription:
Moq File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Moq.dllMD5: 17232c32d99ba292d4ba2a596dbca5f1SHA1: 4c5f8b2c6a2f8eba75baddc484fbef7fe197b4dfSHA256: f7f162572905875a235f565701c8cd23ad540d598f1aeade6d4eb1b93617a71d
Evidence Type Source Name Value Confidence Vendor dll namespace Moq Highest Vendor file name Moq High Vendor grokassembly CompanyName Clarius Consulting, Manas Technology Solutions, InSTEDD Highest Vendor grokassembly FileDescription Moq Low Vendor grokassembly InternalName Moq.dll Low Vendor grokassembly OriginalFilename Moq.dll Low Vendor grokassembly ProductName Moq Medium Vendor msbuild id Moq Medium Vendor msbuild id Moq Low Product dll namespace Moq Highest Product file name Moq High Product grokassembly CompanyName Clarius Consulting, Manas Technology Solutions, InSTEDD Low Product grokassembly FileDescription Moq High Product grokassembly InternalName Moq.dll Medium Product grokassembly OriginalFilename Moq.dll Medium Product grokassembly ProductName Moq Highest Product msbuild id Moq Highest Version AssemblyAnalyzer FilteredVersion 4.8.2 Highest Version grokassembly FileVersion 4.8.2 High Version msbuild version 4.8.2 Highest
Related Dependencies Moq:4.8.2File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj pkg:nuget/Moq@4.8.2 MySqlConnector.dllDescription:
MySqlConnector
A truly async MySQL ADO.NET provider, supporting MySQL Server, MariaDB, Percona Server, Amazon Aurora, Azure Database for MySQL and more. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\MySqlConnector.dllMD5: 19353dd202c1b45717d219cc3f8d14d0SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49ccSHA256: 03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6
Evidence Type Source Name Value Confidence Vendor dll namespace MySqlConnector Highest Vendor file name MySqlConnector High Vendor grokassembly CompanyName Bradley Grainger Highest Vendor grokassembly FileDescription MySqlConnector Low Vendor grokassembly InternalName MySqlConnector.dll Low Vendor grokassembly OriginalFilename MySqlConnector.dll Low Vendor grokassembly ProductName MySqlConnector Medium Product dll namespace MySqlConnector Highest Product file name MySqlConnector High Product grokassembly CompanyName Bradley Grainger Low Product grokassembly FileDescription MySqlConnector High Product grokassembly InternalName MySqlConnector.dll Medium Product grokassembly OriginalFilename MySqlConnector.dll Medium Product grokassembly ProductName MySqlConnector Highest Version AssemblyAnalyzer FilteredVersion 2.1.2 Highest
Related Dependencies MySqlConnector.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\MySqlConnector.dll MD5: 19353dd202c1b45717d219cc3f8d14d0 SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49cc SHA256: 03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6 MySqlConnector.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\MySqlConnector.dll MD5: 19353dd202c1b45717d219cc3f8d14d0 SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49cc SHA256: 03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6 MySqlConnector.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\MySqlConnector.dll MD5: 19353dd202c1b45717d219cc3f8d14d0 SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49cc SHA256: 03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6 MySqlConnector.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\MySqlConnector.dll MD5: 19353dd202c1b45717d219cc3f8d14d0 SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49cc SHA256: 03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6 pkg:generic/MySqlConnector@2.1.2 (Confidence :Medium)cpe:2.3:a:mysql:mysql:2.1.2:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:www-sql_project:www-sql:2.1.2:*:*:*:*:*:*:* (Confidence :Low) suppress CVE-2017-15945 suppress
The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link. CWE-732 Incorrect Permission Assignment for Critical Resource
CVSSv3:
Base Score: HIGH (7.8) Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.2) Vector: /AV:L/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions: (show all )
CVE-2009-4028 suppress
The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library. CWE-20 Improper Input Validation
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2010-1621 suppress
The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N References:
Vulnerable Software & Versions:
CVE-2007-2691 suppress
MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables. NVD-CWE-Other
CVSSv2:
Base Score: MEDIUM (4.9) Vector: /AV:N/AC:M/Au:S/C:N/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-2575 suppress
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J. NVD-CWE-noinfo
CVSSv2:
Base Score: MEDIUM (4.9) Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:N References:
Vulnerable Software & Versions:
CVE-2007-5925 suppress
The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error. CWE-20 Improper Input Validation
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2009-0819 suppress
sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure. NVD-CWE-Other
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2010-3677 suppress
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column. CWE-399 Resource Management Errors
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2010-3682 suppress
Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function. NVD-CWE-Other
CVSSv2:
Base Score: MEDIUM (4.0) Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2010-1626 suppress
MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247. CWE-264 Permissions, Privileges, and Access Controls, CWE-59 Improper Link Resolution Before File Access ('Link Following')
CVSSv2:
Base Score: LOW (3.6) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2007-1420 suppress
MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function. NVD-CWE-Other
CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
Newtonsoft.Json.Bson.dllDescription:
Json.NET BSON .NET Standard 2.0
Json.NET BSON adds support for reading and writing BSON File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Newtonsoft.Json.Bson.dllMD5: 46944e52dbb2982ea49a297902b91ea8SHA1: 0ed43a73f49e0df7b2fa681a627cad7e25074165SHA256: f3c56166d7f90296bbe6b03f64335623c3165ed25948288f1f316fa74dd8327f
Evidence Type Source Name Value Confidence Vendor dll namespace Newtonsoft.Json.Bson Highest Vendor file name Newtonsoft.Json.Bson High Vendor grokassembly CompanyName Newtonsoft Highest Vendor grokassembly FileDescription Json.NET BSON .NET Standard 2.0 Low Vendor grokassembly InternalName Newtonsoft.Json.Bson.dll Low Vendor grokassembly OriginalFilename Newtonsoft.Json.Bson.dll Low Vendor grokassembly ProductName Json.NET BSON Medium Product dll namespace Newtonsoft.Json.Bson Highest Product file name Newtonsoft.Json.Bson High Product grokassembly CompanyName Newtonsoft Low Product grokassembly FileDescription Json.NET BSON .NET Standard 2.0 High Product grokassembly InternalName Newtonsoft.Json.Bson.dll Medium Product grokassembly OriginalFilename Newtonsoft.Json.Bson.dll Medium Product grokassembly ProductName Json.NET BSON Highest Version AssemblyAnalyzer FilteredVersion 1.0.2 Highest
CVE-2024-21907 suppress
Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.
CWE-755 Improper Handling of Exceptional Conditions
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions:
Newtonsoft.Json.dllDescription:
Json.NET .NET Standard 2.0
Json.NET is a popular high-performance JSON framework for .NET File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Newtonsoft.Json.dllMD5: 916d32b899f1bc23b209648d007b99fdSHA1: e3673d05d46f29e68241d4536bddf18cdd0a913dSHA256: 72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661
Evidence Type Source Name Value Confidence Vendor dll namespace Newtonsoft.Json Highest Vendor file name Newtonsoft.Json High Vendor grokassembly CompanyName Newtonsoft Highest Vendor grokassembly FileDescription Json.NET .NET Standard 2.0 Low Vendor grokassembly InternalName Newtonsoft.Json.dll Low Vendor grokassembly OriginalFilename Newtonsoft.Json.dll Low Vendor grokassembly ProductName Json.NET Medium Vendor msbuild id Json Low Vendor msbuild id Newtonsoft Medium Vendor msbuild id Newtonsoft.Json Medium Product dll namespace Newtonsoft.Json Highest Product file name Newtonsoft.Json High Product grokassembly CompanyName Newtonsoft Low Product grokassembly FileDescription Json.NET .NET Standard 2.0 High Product grokassembly InternalName Newtonsoft.Json.dll Medium Product grokassembly OriginalFilename Newtonsoft.Json.dll Medium Product grokassembly ProductName Json.NET Highest Product hint analyzer vendor net Medium Product msbuild id Json Medium Product msbuild id Newtonsoft.Json Highest Version AssemblyAnalyzer FilteredVersion 13.0.1 Highest Version msbuild version 13.0.1 Highest
Related Dependencies Newtonsoft.Json.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Newtonsoft.Json.dll MD5: 916d32b899f1bc23b209648d007b99fd SHA1: e3673d05d46f29e68241d4536bddf18cdd0a913d SHA256: 72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661 Newtonsoft.Json.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Newtonsoft.Json.dll MD5: 916d32b899f1bc23b209648d007b99fd SHA1: e3673d05d46f29e68241d4536bddf18cdd0a913d SHA256: 72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661 Newtonsoft.Json.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Newtonsoft.Json.dll MD5: 916d32b899f1bc23b209648d007b99fd SHA1: e3673d05d46f29e68241d4536bddf18cdd0a913d SHA256: 72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661 Newtonsoft.Json.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Newtonsoft.Json.dll MD5: 916d32b899f1bc23b209648d007b99fd SHA1: e3673d05d46f29e68241d4536bddf18cdd0a913d SHA256: 72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661 Newtonsoft.Json:13.0.1File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Newtonsoft.Json@13.0.1 NuGet.Frameworks.dllDescription:
NuGet.Frameworks
The understanding of target frameworks for NuGet.Packaging. File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\NuGet.Frameworks.dllMD5: a943ff4524e20e7c456efb37cdbf6952SHA1: c1e695466b22abad8c2908c64fa8bcc8e3d9b383SHA256: bdef879f0a4ab2ad97fe934f54e30aee0d06ad06a3ef292933308fca34906ef8
Evidence Type Source Name Value Confidence Vendor dll namespace NuGet.Frameworks Highest Vendor file name NuGet.Frameworks High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription NuGet.Frameworks Low Vendor grokassembly InternalName NuGet.Frameworks.dll Low Vendor grokassembly OriginalFilename NuGet.Frameworks.dll Low Vendor grokassembly ProductName NuGet Medium Product dll namespace NuGet.Frameworks Highest Product file name NuGet.Frameworks High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription NuGet.Frameworks High Product grokassembly InternalName NuGet.Frameworks.dll Medium Product grokassembly OriginalFilename NuGet.Frameworks.dll Medium Product grokassembly ProductName NuGet Highest Version AssemblyAnalyzer FilteredVersion 5.0.0 Highest
CVE-2022-30184 suppress
.NET and Visual Studio Information Disclosure Vulnerability NVD-CWE-noinfo, CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.3) Vector: /AV:N/AC:M/Au:N/C:P/I:N/A:N References:
Vulnerable Software & Versions: (show all )
Occurrence.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\Occurrence.jsMD5: c4863b7d114b640dfc0bcede07866b74SHA1: 5b7f78f12a7f6f57dbfa3c2847566cad449ca5daSHA256: 96ba9342a6bef69b3ab247fef259347d3ad81106f7d65071f972fdeea25a9ad6
Evidence Type Source Name Value Confidence
Related Dependencies Occurrence.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\Occurrence.js MD5: c4863b7d114b640dfc0bcede07866b74 SHA1: 5b7f78f12a7f6f57dbfa3c2847566cad449ca5da SHA256: 96ba9342a6bef69b3ab247fef259347d3ad81106f7d65071f972fdeea25a9ad6 Partner.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\model\Partner.jsMD5: ea3c65bd5438d575bc22ae0fed1dd7b2SHA1: bf447361669aabc5a7dccf2afef05b61be6c2d7eSHA256: fa186a3683e8558db6aa080930d4d73e66fec752fef78417f4f2b3f34d2aa9ab
Evidence Type Source Name Value Confidence
Related Dependencies Partner.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\Partner.js MD5: ea3c65bd5438d575bc22ae0fed1dd7b2 SHA1: bf447361669aabc5a7dccf2afef05b61be6c2d7e SHA256: fa186a3683e8558db6aa080930d4d73e66fec752fef78417f4f2b3f34d2aa9ab PartnerCustomerMapping.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\PartnerCustomerMapping.jsMD5: 2b1d9b8784f22191693a6c5b468c9958SHA1: a740a1ff1d3d107979714d9e4a0c71b0312e7edbSHA256: 987e5af18db567a6163776ec0ebb2e755f5dc9f1ce3b6d6586ca18f59411ebdb
Evidence Type Source Name Value Confidence
PartnerCustomerMappingRepository.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\repository\PartnerCustomerMappingRepository.jsMD5: 87007e8334ae47fa5d9d167c5f2069d1SHA1: c047c2c4b30e88462f25c55b076cda55ee3a34f1SHA256: d499c0a4b6627bcf8782c8760efa136c38d3819bc981d290b33db9a244ebf850
Evidence Type Source Name Value Confidence
PartnerCustomerMappingRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\PartnerCustomerMappingRepository.jsMD5: 339bab9ab78d38a63cecdc4045870b24SHA1: cdd9e5e71f0b38dec114f7c680379db026d4505dSHA256: aed01e01495a03b469380330ff198ce737892ddc2c785f46e1d2d0366336492d
Evidence Type Source Name Value Confidence
PartnerHandler.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\PartnerHandler.jsMD5: 942723d6c2563c80e0e3347f3785ed58SHA1: f94dec5e3f6e150e776e59718ae1ec5d935253e2SHA256: 616fe23cadef9faec580ef221e21fa0a65ed08107fe83edca90d2e97b9fbbb52
Evidence Type Source Name Value Confidence
PartnerRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\PartnerRepository.jsMD5: a945664c6ffa442c0c8459b6c876ad35SHA1: 524955839db9df42a783dbf8ead4f4eae9dcd4f1SHA256: fbefdbdd4828b137ba30d9b990cf6a26636ee857a1374fe0f454a6bca8e3a49f
Evidence Type Source Name Value Confidence
PartnerRepository.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\repositories\PartnerRepository.jsMD5: 0c3a1337cb85989559531ed073337a9fSHA1: fa15aedecb5e4da84d6e63875dfd1882c5c91abdSHA256: 2beb46e31b07ff471c43cffbb8f1ada1dbd0f328f8fa3c611a7dbaf3e59937b4
Evidence Type Source Name Value Confidence
PartnerStatus.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\PartnerStatus.jsMD5: e6dd816814c279a95a026c84685d68d6SHA1: fa55390e17799a355e8206aa851fae9282e101feSHA256: a68478a920d0111cb786f9a02607351fad1465ea1453fea53f6b99a51c526d0c
Evidence Type Source Name Value Confidence
PartnerStatus.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\constants\PartnerStatus.jsMD5: bc61d53822fff6252f9c7ed15ed08995SHA1: 0a9b44b7cd7ee5c5bc4299e32ba5ff938bffad17SHA256: 2dc1d88408ba98d821ce481f011640030a49496ac2df473329bcbd81d7c3096a
Evidence Type Source Name Value Confidence
Related Dependencies ResellerStatus.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\constants\ResellerStatus.js MD5: bc61d53822fff6252f9c7ed15ed08995 SHA1: 0a9b44b7cd7ee5c5bc4299e32ba5ff938bffad17 SHA256: 2dc1d88408ba98d821ce481f011640030a49496ac2df473329bcbd81d7c3096a PaymentFormConfigurationSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\PaymentFormConfigurationSwagger.jsMD5: 6cc34b5e13cb06feacf7b188cda69466SHA1: 768f0f8506d4cf50a372a83ee3c71ed981464536SHA256: fa599d3d407e606aea9054f3f66a8dfa21a92be66b30e4a764f51eb43103e97d
Evidence Type Source Name Value Confidence
Pomelo.EntityFrameworkCore.MySql.dllDescription:
Pomelo.EntityFrameworkCore.MySql
Pomelo's MySQL database provider for Entity Framework Core. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dllMD5: ee4be55be7d811e11a08aa9270485aeeSHA1: 464e2c280ff37c3e75fc5745cab976b497a28821SHA256: 3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13
Evidence Type Source Name Value Confidence Vendor file name Pomelo.EntityFrameworkCore.MySql High Vendor grokassembly CompanyName Pomelo Foundation Highest Vendor grokassembly FileDescription Pomelo.EntityFrameworkCore.MySql Low Vendor grokassembly InternalName Pomelo.EntityFrameworkCore.MySql.dll Low Vendor grokassembly OriginalFilename Pomelo.EntityFrameworkCore.MySql.dll Low Vendor grokassembly ProductName Pomelo.EntityFrameworkCore.MySql Medium Vendor msbuild id EntityFrameworkCore Low Vendor msbuild id EntityFrameworkCore.MySql Low Vendor msbuild id Pomelo Medium Vendor msbuild id Pomelo.EntityFrameworkCore.MySql Medium Product file name Pomelo.EntityFrameworkCore.MySql High Product grokassembly CompanyName Pomelo Foundation Low Product grokassembly FileDescription Pomelo.EntityFrameworkCore.MySql High Product grokassembly InternalName Pomelo.EntityFrameworkCore.MySql.dll Medium Product grokassembly OriginalFilename Pomelo.EntityFrameworkCore.MySql.dll Medium Product grokassembly ProductName Pomelo.EntityFrameworkCore.MySql Highest Product msbuild id EntityFrameworkCore Medium Product msbuild id EntityFrameworkCore.MySql Medium Product msbuild id Pomelo.EntityFrameworkCore.MySql Highest Version AssemblyAnalyzer FilteredVersion 6.0.2 Highest Version grokassembly ProductVersion 6.0.2 Highest Version msbuild version 6.0.2 Highest
Related Dependencies Pomelo.EntityFrameworkCore.MySql.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dll MD5: ee4be55be7d811e11a08aa9270485aee SHA1: 464e2c280ff37c3e75fc5745cab976b497a28821 SHA256: 3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13 Pomelo.EntityFrameworkCore.MySql.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dll MD5: ee4be55be7d811e11a08aa9270485aee SHA1: 464e2c280ff37c3e75fc5745cab976b497a28821 SHA256: 3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13 Pomelo.EntityFrameworkCore.MySql.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dll MD5: ee4be55be7d811e11a08aa9270485aee SHA1: 464e2c280ff37c3e75fc5745cab976b497a28821 SHA256: 3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13 Pomelo.EntityFrameworkCore.MySql.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dll MD5: ee4be55be7d811e11a08aa9270485aee SHA1: 464e2c280ff37c3e75fc5745cab976b497a28821 SHA256: 3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13 Pomelo.EntityFrameworkCore.MySql:6.0.2File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj pkg:nuget/Pomelo.EntityFrameworkCore.MySql@6.0.2 Pomelo.EntityFrameworkCore.MySql:6.0.2File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj pkg:nuget/Pomelo.EntityFrameworkCore.MySql@6.0.2 Pomelo.EntityFrameworkCore.MySql:6.0.2File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj pkg:nuget/Pomelo.EntityFrameworkCore.MySql@6.0.2 ProductStatus.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\ProductStatus.jsMD5: 2045f0e6752b962f7f494defe920122aSHA1: 0c1b314858f7beb49d2584343df896db44544562SHA256: 45ff3a672e898ac5a1e2f15356e1daf073424719a797ac7d314a943031734b59
Evidence Type Source Name Value Confidence
RegisterFeeRoutes.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\RegisterFeeRoutes.jsMD5: 43b9b5816cce842e08c45af84b8860bbSHA1: a5857339c0c2b2991865f947bce11bc81827be99SHA256: d40980f7db9d4255c61f04834960ec6f95c34c0bc437441b2a0d16f878116390
Evidence Type Source Name Value Confidence
RegisterTaxRoutes.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\RegisterTaxRoutes.jsMD5: 92e110b893d0f799d35950c2cc55b884SHA1: ece15aba19265b51fe7fcf900aa08a4c5e7b8dd8SHA256: 201d680e93dbb5fe3fe30f516b0c57cb842e83dd40a1d501dd6d16bfa8cfcca9
Evidence Type Source Name Value Confidence
RegisterTermsAndConditionsRoutes.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\RegisterTermsAndConditionsRoutes.jsMD5: 71a538ae0a980458e198a679fc35b2d2SHA1: e905823010a99c7105fed6f8f942d0ff508db05eSHA256: bbc9ed7a0a56b4ae9e4f4409342015798167b4dcad9f9e6d5cde245660a078a5
Evidence Type Source Name Value Confidence
RegisterUrlRoutes.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\RegisterUrlRoutes.jsMD5: bb08b0de6f7b13dfc2b308e926adee22SHA1: da7865f12249d2d7cc95e025fda922059713844eSHA256: a942b0ffcf5523acd5b6f8a7507f5d5d9eee81a04b15ccf0cf66f744ca1fd2b7
Evidence Type Source Name Value Confidence
Reseller.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\model\Reseller.jsMD5: 9bfed6404d3875b7d31cbf3eac3b7685SHA1: 800174b4d3153cb71b0b34c8130180743e356ecdSHA256: 9ae3119c012701d5dd2ecf2f40e882e9ed77e2ff4845940c3a511de55e30fbc0
Evidence Type Source Name Value Confidence
ResellerHandler.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\ResellerHandler.jsMD5: 472509d30e26faaa6ef805e5f2fdededSHA1: f3ec70d3f1b52db66a739a3b97cd400c70e2e833SHA256: d0fd4e71f786c1abe075a05c677ff33f7c760d0420c12598f42cce3e01e88eb4
Evidence Type Source Name Value Confidence
ResellerRepository.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\repositories\ResellerRepository.jsMD5: 5c5db7408aa985711984fba2283fd6f1SHA1: bbbbf52bed746a52ae437a95c4309a6b38328122SHA256: 65b6b2ef7408b53fef33690862a759195babbc33aff72e867879481c26d38ee7
Evidence Type Source Name Value Confidence
SQLitePCLRaw.core.dllDescription:
SQLitePCLRaw.core
SQLitePCLRaw is a Portable Class Library (PCL) for low-level (raw) access to SQLite File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\SQLitePCLRaw.core.dllMD5: 358bf09045a59a1b85acd9bc0a592904SHA1: 53cf59d7b192f570d528b4d5c72dfa7ac25e1d7bSHA256: 6be5d612830990f4185dea66b4baabe191d641a3a97e081a2f62fbadf2af5b0f
Evidence Type Source Name Value Confidence Vendor file name SQLitePCLRaw.core High Vendor grokassembly CompanyName SourceGear Highest Vendor grokassembly FileDescription SQLitePCLRaw.core Low Vendor grokassembly InternalName SQLitePCLRaw.core.dll Low Vendor grokassembly OriginalFilename SQLitePCLRaw.core.dll Low Product file name SQLitePCLRaw.core High Product grokassembly CompanyName SourceGear Low Product grokassembly FileDescription SQLitePCLRaw.core High Product grokassembly InternalName SQLitePCLRaw.core.dll Medium Product grokassembly OriginalFilename SQLitePCLRaw.core.dll Medium Version AssemblyAnalyzer FilteredVersion 2.0.6 Highest Version grokassembly ProductVersion 2.0.6 Highest
Related Dependencies SQLitePCLRaw.batteries_v2.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\SQLitePCLRaw.batteries_v2.dll MD5: a40aae67aad4dcff1489cc8fbb761515 SHA1: d6bc2b387e250405adf753d8683ac55f5ed3333a SHA256: c09e671de63c51708d106d95b51da7c58c7dbe55a732c1fb5d895847cf67f78c pkg:generic/SQLitePCLRaw.batteries_v2@2.0.6 CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
SQLitePCLRaw.provider.e_sqlite3.dllDescription:
SQLitePCLRaw.provider.e_sqlite3
SQLitePCLRaw is a Portable Class Library (PCL) for low-level (raw) access to SQLite File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\SQLitePCLRaw.provider.e_sqlite3.dllMD5: 15aa5f7d13d358d33d67cafdd13dc768SHA1: a071a6c2b291969ae0d182172593bba2b9b0ac84SHA256: 563a17c67cab6f660779a76c9f960afe444062560d82fe638d15113566eea4a8
Evidence Type Source Name Value Confidence Vendor file name SQLitePCLRaw.provider.e_sqlite3 High Vendor grokassembly CompanyName SourceGear Highest Vendor grokassembly FileDescription SQLitePCLRaw.provider.e_sqlite3 Low Vendor grokassembly InternalName SQLitePCLRaw.provider.e_sqlite3.dll Low Vendor grokassembly OriginalFilename SQLitePCLRaw.provider.e_sqlite3.dll Low Product file name SQLitePCLRaw.provider.e_sqlite3 High Product grokassembly CompanyName SourceGear Low Product grokassembly FileDescription SQLitePCLRaw.provider.e_sqlite3 High Product grokassembly InternalName SQLitePCLRaw.provider.e_sqlite3.dll Medium Product grokassembly OriginalFilename SQLitePCLRaw.provider.e_sqlite3.dll Medium Version AssemblyAnalyzer FilteredVersion 2.0.6 Highest Version grokassembly ProductVersion 2.0.6 Highest
CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\config\SSMParameters.jsMD5: 8b3214a0c09ca95f8062e068f6c14c63SHA1: a5761970d8338ce56aa20412684fa9e731a0113bSHA256: f295f888b0dee1024aa570d07329b6f4a3cfc96f6b85f4fd25c5c1aa8472b29d
Evidence Type Source Name Value Confidence
SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\config\SSMParameters.jsMD5: 277c3336423e01eef6991c5a49e12a54SHA1: dc984a233de2dde031ae363847f3771bc6516f25SHA256: 97fc472a7b5cd4e4cb606f6dee13951e4ae044a408b7591ecb614fd99ff5e05f
Evidence Type Source Name Value Confidence
SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\config\SSMParameters.jsMD5: 5db5fc577c374ff7857fa7ee37fa5927SHA1: 1d86de094b14261d26e0ceeff55b9861da30d060SHA256: 3050d8cbd2f3270ffec2921b539a657e4c43574a69f274059f82d7082fa93c8e
Evidence Type Source Name Value Confidence
SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\config\SSMParameters.jsMD5: fe9cca30541b1eb0c91e11299f64d437SHA1: f65f35a3d9ebe86c86e0f4ec93da550488b7f15fSHA256: 9c2e593141707ed4b5de92d0e7ea2d8eb39b373ed20d0bc3d3a1071b9b233f56
Evidence Type Source Name Value Confidence
Related Dependencies SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\config\SSMParameters.js MD5: fe9cca30541b1eb0c91e11299f64d437 SHA1: f65f35a3d9ebe86c86e0f4ec93da550488b7f15f SHA256: 9c2e593141707ed4b5de92d0e7ea2d8eb39b373ed20d0bc3d3a1071b9b233f56 SSMParameters.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\config\SSMParameters.jsMD5: 3a6e15d408d68089a458ae09f00d9b3fSHA1: b7923dc9454cab5045fd20fd7b4a3b1e4c036885SHA256: e1dcb979f30af065bd2d099030c9dcb4bc9d223242cb3d733ef718c4535a0bc9
Evidence Type Source Name Value Confidence
StatesSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\StatesSwagger.jsMD5: e3bd171a1e84ff2e008791ca5025d37bSHA1: 747ec62c85c57619d52b18ec226b2c0937a98125SHA256: 990252cf3703f6ab9657f460599b75cf99d2c1f43631ee06c1d4cfc66aa3a4ef
Evidence Type Source Name Value Confidence
SubEntityType.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\SubEntityType.jsMD5: db1a5f34cfc1bf153d3a7fdc9767d1d8SHA1: a0c575b9c7d5b9bbb1342486ea2cbff9f34325b4SHA256: b25e935d56461161e808a416c14fcf3b3b80f5661820457d2f345a091b63b2c5
Evidence Type Source Name Value Confidence
Related Dependencies SubEntityType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\SubEntityType.js MD5: db1a5f34cfc1bf153d3a7fdc9767d1d8 SHA1: a0c575b9c7d5b9bbb1342486ea2cbff9f34325b4 SHA256: b25e935d56461161e808a416c14fcf3b3b80f5661820457d2f345a091b63b2c5 SwaggerController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\controller\SwaggerController.jsMD5: bd22f02068508734e8ca04e0e030ff5eSHA1: d99dc39625a702d398367076e4641f8a2c703033SHA256: 5a2f5df1562b069c721448edaf998971a04f773dcca85b2027b2cbdd44df401e
Evidence Type Source Name Value Confidence
System.IdentityModel.Tokens.Jwt.dllDescription:
System.IdentityModel.Tokens.Jwt
Includes types that provide support for creating, serializing and validating JSON Web Tokens. File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dllMD5: beb053ced12524cd30929c39fe042c47SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6fSHA256: 64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee
Evidence Type Source Name Value Confidence Vendor dll namespace System.IdentityModel.Tokens.Jwt Highest Vendor file name System.IdentityModel.Tokens.Jwt High Vendor grokassembly CompanyName Microsoft Corporation. Highest Vendor grokassembly FileDescription System.IdentityModel.Tokens.Jwt Low Vendor grokassembly InternalName System.IdentityModel.Tokens.Jwt.dll Low Vendor grokassembly OriginalFilename System.IdentityModel.Tokens.Jwt.dll Low Vendor grokassembly ProductName Microsoft IdentityModel Medium Product dll namespace System.IdentityModel.Tokens.Jwt Highest Product file name System.IdentityModel.Tokens.Jwt High Product grokassembly CompanyName Microsoft Corporation. Low Product grokassembly FileDescription System.IdentityModel.Tokens.Jwt High Product grokassembly InternalName System.IdentityModel.Tokens.Jwt.dll Medium Product grokassembly OriginalFilename System.IdentityModel.Tokens.Jwt.dll Medium Product grokassembly ProductName Microsoft IdentityModel Highest Version AssemblyAnalyzer FilteredVersion 5.6.0.61018 Highest Version grokassembly FileVersion 5.6.0.61018 High
Related Dependencies System.IdentityModel.Tokens.Jwt.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dll MD5: beb053ced12524cd30929c39fe042c47 SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6f SHA256: 64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee System.IdentityModel.Tokens.Jwt.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dll MD5: beb053ced12524cd30929c39fe042c47 SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6f SHA256: 64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee System.IdentityModel.Tokens.Jwt.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dll MD5: beb053ced12524cd30929c39fe042c47 SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6f SHA256: 64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee System.IdentityModel.Tokens.Jwt.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dll MD5: beb053ced12524cd30929c39fe042c47 SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6f SHA256: 64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee pkg:generic/System.IdentityModel.Tokens.Jwt@5.6.0.61018 (Confidence :Medium)cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:* (Confidence :Low) suppress CVE-2024-21319 suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation, NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (6.8) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
System.IdentityModel.Tokens.Jwt:5.6.0File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id IdentityModel Low Vendor msbuild id IdentityModel.Tokens.Jwt Low Vendor msbuild id System Medium Vendor msbuild id System.IdentityModel.Tokens.Jwt Medium Product msbuild id IdentityModel Medium Product msbuild id IdentityModel.Tokens.Jwt Medium Product msbuild id System.IdentityModel.Tokens.Jwt Highest Version msbuild version 5.6.0 Highest
CVE-2024-21319 (OSSINDEX) suppress
Microsoft Identity Denial of service vulnerability CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (6.800000190734863) Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H References:
Vulnerable Software & Versions (OSSINDEX):
cpe:2.3:a:*:System.IdentityModel.Tokens.Jwt:5.6.0:*:*:*:*:*:*:* System.Security.Cryptography.Xml.dllDescription:
System.Security.Cryptography.Xml
System.Security.Cryptography.Xml File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\System.Security.Cryptography.Xml.dllMD5: f94303ed2487aa66fae8a3c08ff8240cSHA1: 5a95de9f2293e3b2438c061312aa298db5e9f0e5SHA256: 805a9fe21eb53635a6696ca5d319e5b13e399991e3c4e3f6084ce9b85a2c4ffb
Evidence Type Source Name Value Confidence Vendor dll namespace System Highest Vendor dll namespace System.Security.Cryptography.Xml Highest Vendor file name System.Security.Cryptography.Xml High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription System.Security.Cryptography.Xml Low Vendor grokassembly InternalName System.Security.Cryptography.Xml.dll Low Vendor grokassembly OriginalFilename System.Security.Cryptography.Xml.dll Low Vendor grokassembly ProductName Microsoft® .NET Framework Medium Product dll namespace System Highest Product dll namespace System.Security.Cryptography.Xml Highest Product file name System.Security.Cryptography.Xml High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription System.Security.Cryptography.Xml High Product grokassembly InternalName System.Security.Cryptography.Xml.dll Medium Product grokassembly OriginalFilename System.Security.Cryptography.Xml.dll Medium Product grokassembly ProductName Microsoft® .NET Framework Highest Version AssemblyAnalyzer FilteredVersion 4.6.26418.02 Highest Version grokassembly FileVersion 4.6.26418.02 High
Related Dependencies System.Security.Cryptography.Xml.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\System.Security.Cryptography.Xml.dll MD5: f94303ed2487aa66fae8a3c08ff8240c SHA1: 5a95de9f2293e3b2438c061312aa298db5e9f0e5 SHA256: 805a9fe21eb53635a6696ca5d319e5b13e399991e3c4e3f6084ce9b85a2c4ffb System.Security.Cryptography.Xml.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\System.Security.Cryptography.Xml.dll MD5: f94303ed2487aa66fae8a3c08ff8240c SHA1: 5a95de9f2293e3b2438c061312aa298db5e9f0e5 SHA256: 805a9fe21eb53635a6696ca5d319e5b13e399991e3c4e3f6084ce9b85a2c4ffb System.Security.Cryptography.Xml.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\System.Security.Cryptography.Xml.dll MD5: f94303ed2487aa66fae8a3c08ff8240c SHA1: 5a95de9f2293e3b2438c061312aa298db5e9f0e5 SHA256: 805a9fe21eb53635a6696ca5d319e5b13e399991e3c4e3f6084ce9b85a2c4ffb System.Xml.XPath.XmlDocument.dllDescription:
System.Xml.XPath.XmlDocument
System.Xml.XPath.XmlDocument File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\System.Xml.XPath.XmlDocument.dllMD5: 176e9b8e9b622a51e5b3db8d0fac6eeaSHA1: 5354245e852fdc31019f6496c1b7cae056b471ffSHA256: f95c1bd1cf19ef02b788a3473ccc64716d26504d98831ddcb240f1d913a3eef3
Evidence Type Source Name Value Confidence Vendor dll namespace System Highest Vendor dll namespace System.Xml Highest Vendor dll namespace System.Xml.XPath Highest Vendor file name System.Xml.XPath.XmlDocument High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription System.Xml.XPath.XmlDocument Low Vendor grokassembly InternalName System.Xml.XPath.XmlDocument.dll Low Vendor grokassembly OriginalFilename System.Xml.XPath.XmlDocument.dll Low Vendor grokassembly ProductName Microsoft® .NET Framework Medium Product dll namespace System Highest Product dll namespace System.Xml Highest Product dll namespace System.Xml.XPath Highest Product file name System.Xml.XPath.XmlDocument High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription System.Xml.XPath.XmlDocument High Product grokassembly InternalName System.Xml.XPath.XmlDocument.dll Medium Product grokassembly OriginalFilename System.Xml.XPath.XmlDocument.dll Medium Product grokassembly ProductName Microsoft® .NET Framework Highest Version AssemblyAnalyzer FilteredVersion 1.0.24212.01 Highest Version grokassembly FileVersion 1.0.24212.01 High
Related Dependencies System.Xml.XPath.XmlDocument.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\System.Xml.XPath.XmlDocument.dll MD5: 176e9b8e9b622a51e5b3db8d0fac6eea SHA1: 5354245e852fdc31019f6496c1b7cae056b471ff SHA256: f95c1bd1cf19ef02b788a3473ccc64716d26504d98831ddcb240f1d913a3eef3 SystemInfoRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\config\SystemInfoRepository.jsMD5: c1b84224571117ddddec0c252a03ce06SHA1: 9a7a6ba0c0764f097136976d4acb2b8a50b46266SHA256: 102746862c9520db3b15fe3b04eef18a7bd8541ded1bc6abcfe7b3b40a5e46cc
Evidence Type Source Name Value Confidence
Tax.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\model\Tax.jsMD5: 53a2133aee8244903401161b581f22b4SHA1: 52536d8c64a4dd82c000d55578a0d0379eec7906SHA256: 0334d87d46234edd922cbda94917ae62f41c558e86cf404e85d029925b576647
Evidence Type Source Name Value Confidence
TaxAssembler.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\assembler\TaxAssembler.jsMD5: 035e8fc58636622fabe16361fcaee243SHA1: 23a90f8d38b87a143635c9f35e0aae018c0a1ed8SHA256: 8093973ce1e64c5ac7aa9543eebcd7d5fafe86764f42ae5468fbd4ae0c4fb32c
Evidence Type Source Name Value Confidence
TaxCalculationSrvice.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\services\TaxCalculationSrvice.jsMD5: 34bb125b1e7162bff2d11d841518c446SHA1: 4767e6abab3f70a8c63412dbfa7a6dea917b0ed4SHA256: 597c41eb96818096d9dcd16f5186f0f6c4a3d1cd25c5aa9158c81004a2c04b5b
Evidence Type Source Name Value Confidence
TaxConfigurationValidationMessage.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TaxConfigurationValidationMessage.jsMD5: 4983bc7c4e3308fe784002c247a5fe02SHA1: c0d013f1256912ee86709ee2f5a82e7bdfbfaa06SHA256: 3c2db3e236889c75f5069351953ea14c15367be98cd2c4b418d25dc8ecd65fb9
Evidence Type Source Name Value Confidence
TaxController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\controllers\TaxController.jsMD5: d5d4dbbf197e68be97b57e17e61fa5adSHA1: b28b545403b856e1d6dad124d667feb5cf1aa2c9SHA256: a2394a20d9fd9db36636cb6a4d930bb2eadb1ea2067516ed8bf00efc04edc292
Evidence Type Source Name Value Confidence
TaxRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\repositories\TaxRepository.jsMD5: 064cd152220ca5fe582c4c2fda5bfdbaSHA1: 8705715c83c79b2a689aa7824effdf2130855f0eSHA256: 33e3f7bde47d4ff6cf5162ac2e478715a35c876d4cb9580035886daa254ee953
Evidence Type Source Name Value Confidence
TaxServices.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\services\TaxServices.jsMD5: 52852e1bee19ed783f45b051a8fba3e6SHA1: 55a9262b1cda2424f7faac1398f17ec91d52bdf7SHA256: cb1e95d97d469cf7a04db4d1e0cd1659d9b36b8a26c7436e972c3cc3feb35f81
Evidence Type Source Name Value Confidence
TaxSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TaxSwagger.jsMD5: a39c8dbaacbd65e4f8abae0a9c6452beSHA1: f200103c3a8f117b59f62737f29639c3fe1b1d90SHA256: 90736e17283354f9a570fa901e5c3392179293b33d16eb6b5c70bd8f964ab427
Evidence Type Source Name Value Confidence
TaxType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\TaxType.jsMD5: 8058f627355f18c0e02f02851ca44805SHA1: d08f7e6c1bf1de1145017914dd73eaa9bf9bdfc3SHA256: 0d7e304f9a4299397c6f78806417cc9ee7e13316df094d1f749a360e5db5aa99
Evidence Type Source Name Value Confidence
TermConfigurationValidationMessage.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermConfigurationValidationMessage.jsMD5: ad932f116a2109ec3e54557b68612443SHA1: 36ab960249f35484744a152fb1b47d706b1c5eefSHA256: ab7a70664e0641de11c8c14219ad65f4d05e0296a9d89adc8cc67977afaaa3bd
Evidence Type Source Name Value Confidence
TermsAcceptance.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAcceptance.jsMD5: 1140e44697cb28b8a06b7d129cb90fb3SHA1: 1808657e4a5cbb2d964e62d459fbd5148a4b5824SHA256: 51243693334e45ecaa56fcec0a6709a822645037e233f537438b718e8e9dce7f
Evidence Type Source Name Value Confidence
TermsAcceptance.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\TermsAcceptance.jsMD5: ca1a8b59cd0b0e4094ca6d08e3d3bee3SHA1: 71846bef96abded0024acace667f18d64de25818SHA256: c330116cba706b0bc55c7d57a781a49ea9f11f4ed66b69303ddb118130f5df97
Evidence Type Source Name Value Confidence
TermsAcceptanceAssembler.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\assembler\TermsAcceptanceAssembler.jsMD5: 46161154d67c2c4f5dc279a76837b839SHA1: 5db1fb71a08362a8a0e122d3a266c5338d36fdeeSHA256: 846dff58a837ac1182502a75f05ad1288d497b05ae31b5134e38096b5f592dd8
Evidence Type Source Name Value Confidence
TermsAcceptanceController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAcceptanceController.jsMD5: 64c63de69de89ebb89fde82e7f14d9e4SHA1: f1a80604900ac8721602886e1cb46c6224604b4aSHA256: 64b3a32416946c7faf8f7cd2a96872c61d975e1df84c2d156f0cbc6f9380096a
Evidence Type Source Name Value Confidence
TermsAcceptanceRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\repositories\TermsAcceptanceRepository.jsMD5: c59ec4d6c639c0d7f9b4970b21d07be4SHA1: 5957709a4555a4a66157ff55bc971897428314a4SHA256: 180abd99a7c5d468f608a526617f6eae942f4675a810340a3f130e16fe6bc4ab
Evidence Type Source Name Value Confidence
TermsAcceptanceRepository.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\repositories\TermsAcceptanceRepository.jsMD5: 53e779ec5bed0e515d278c45f9ffab02SHA1: efd5b8340c9bf677b3d7c803c6ac31b653815e02SHA256: ca9153e4c73cf6524526e5a9483fc3844b6588bb0de8d96a058d1c0f64bb0c35
Evidence Type Source Name Value Confidence
TermsAcceptanceService.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAcceptanceService.jsMD5: fee46de2b8cca90e6ee8643a3e3a4383SHA1: bf8841ad78671371d8aa446cec7755f10e0db2f4SHA256: fea37a405b17ce028bfc7cfbab6bb4f01c0fb8b607915743264302b78e284734
Evidence Type Source Name Value Confidence
TermsAcceptanceSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAcceptanceSwagger.jsMD5: b6f7470623140ffa83f94bee91c92796SHA1: 08461754bf5e9690027eda84f83d14c54b7d80ccSHA256: 9a7116397eab97049aab54dc3ec02da5386e092e31dd9910acba65b338961a6f
Evidence Type Source Name Value Confidence
TermsAcceptanceValidationMessages.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermsAcceptanceValidationMessages.jsMD5: 7b8207c87b76c3d5309a8e91fe7f8e9fSHA1: 6e890f5737fd5be279590c8788f2264b716a99feSHA256: ea538b6a800c1794b852db9e85e8b0422eec8f97ab6bd43838d0cd9b571742d2
Evidence Type Source Name Value Confidence
TermsAndConditionHandler.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\TermsAndConditionHandler.jsMD5: 6efd48217964cad8c2eaa0c2c17ff1f3SHA1: 70e028360dee2c390c1d25b9b895870720b9f370SHA256: 113894cd6b8bd3b41f3e3ff68d025178b62f08765de3bbdde02d4aeba1f52d25
Evidence Type Source Name Value Confidence
TermsAndConditions.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAndConditions.jsMD5: dddea7f4c1f4b2462d82c7091469cb82SHA1: bcedb5f9910cc5be50d435857815c7b9fd06b1b9SHA256: 7835854cb993b29bf6a38cec16eca92f65b227df5c58914db604e1470ae16137
Evidence Type Source Name Value Confidence
TermsAndConditions.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\model\TermsAndConditions.jsMD5: 2fda34450d64990432c875dd80128addSHA1: 2dceacabec927093bf458f1110aacd337c373878SHA256: d8ec17795871ee5a7cbc78c6470ed546844e2d0d99b97603a5dd2a4e858df267
Evidence Type Source Name Value Confidence
Related Dependencies TermsAndConditions.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\model\TermsAndConditions.js MD5: 2fda34450d64990432c875dd80128add SHA1: 2dceacabec927093bf458f1110aacd337c373878 SHA256: d8ec17795871ee5a7cbc78c6470ed546844e2d0d99b97603a5dd2a4e858df267 TermsAndConditions.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\TermsAndConditions.jsMD5: fc3b1bc533f81523e5c7dc5f38d3bc86SHA1: 1fdd912141413a844c6c82f915eb1c93565f6d06SHA256: 26f6d3bbbb646eb7541673dc14bcb8e2d274a512b0a5944da0754a7117846053
Evidence Type Source Name Value Confidence
TermsAndConditionsAssembler.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\assembler\TermsAndConditionsAssembler.jsMD5: 908ce906dd28d4c6042d5944219fe194SHA1: 94ed444cf4260d233320c0949e215608cfa69386SHA256: 1ae834639d353cad49d7f86f0e9cd7c7f072ca108f7fdcb7303f529a1a3d875f
Evidence Type Source Name Value Confidence
TermsAndConditionsController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAndConditionsController.jsMD5: de7cea82d7ff3c990982cb616648f810SHA1: 6aa65cd88772c3958433c6a74c52307f618a1a09SHA256: dd53cb8320a50ceb84c8061f73d6c3f53649c6126e6a65ac5d942a2abfa1bb7b
Evidence Type Source Name Value Confidence
TermsAndConditionsDocument.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAndConditionsDocument.jsMD5: 0533d0b17b6eec7b819f7b0423a66da9SHA1: f0d5ffdc424fa3e6c5291f88845c6d9a0050aeabSHA256: ebc76989983b9c26a442be61e6c4201abd11f70dfc9bf966419194e8daf6032a
Evidence Type Source Name Value Confidence
TermsAndConditionsDocumentController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAndConditionsDocumentController.jsMD5: 4a7a10d5854b2ac893e1a454f720fd22SHA1: 3de8dd7413b70a6d0d2026c68324d4eb9aaeaa91SHA256: 0ed1e8e5c547c590cf879d87ab402b6cfa8006f81512a01ce4b1e246133a08b4
Evidence Type Source Name Value Confidence
TermsAndConditionsDocumentSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\TermsAndConditionsDocumentSchema.jsMD5: 4ecfa7412eb4fe8c491792f113506281SHA1: 6caa78bac338929e1fe20a1ea78f38ef5abb4502SHA256: 610ee4a8a3d3f5f4e0824ee663ea643f55e39b8f94b6c6a23676b93a9ff54962
Evidence Type Source Name Value Confidence
TermsAndConditionsDocumentService.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAndConditionsDocumentService.jsMD5: 872532af7c66ca4281cecca68a2e95bcSHA1: 75dfbae7d0dde3cc9a20ffd289b3273aae16dca2SHA256: 053276137d2210298db043b814198b4160f29225185d9f7e3c6060f190a36561
Evidence Type Source Name Value Confidence
TermsAndConditionsDocumentSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAndConditionsDocumentSwagger.jsMD5: 2f90694af8484b0c97a7fdecddd90a7bSHA1: b5b8fecdbdabf89bb5e777a9fef99c48c4c4b3f5SHA256: 9455579cdb678ee8363bb2eb9cd2afc1e0eeca293416995c9f68af836130f60b
Evidence Type Source Name Value Confidence
TermsAndConditionsDocumentValidationMessages.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermsAndConditionsDocumentValidationMessages.jsMD5: 5911be6a219623c2d7076ef593b7a314SHA1: 4cd2c2239817710eafc583556fb7a5a8f4a6f9d2SHA256: 26193d42c7dc4475679b971ad639b7ff68ecb66950025af288ca473637fd713e
Evidence Type Source Name Value Confidence
TermsAndConditionsRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\repositories\TermsAndConditionsRepository.jsMD5: bf6dbde685d7ba07372b07b55211fd4dSHA1: bc383cc284231f316e7fa194dd64846ab34d14d5SHA256: 83d3031b3fe765a0b5d7baf57d5c4a42eb54423ea743432861af5ae5d4a23a3b
Evidence Type Source Name Value Confidence
TermsAndConditionsRepository.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\repositories\TermsAndConditionsRepository.jsMD5: ce4f7b1d5b65979e69d872aafec2dcfdSHA1: c5f574886bf472c587d5a8193e4e9c4ad4e77dd9SHA256: d8eb8cdfecf983fa9ec3f8d6dde4c463f482c999eb699cf0b60abcc74c141a2b
Evidence Type Source Name Value Confidence
TermsAndConditionsRepository.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\repositories\TermsAndConditionsRepository.jsMD5: bb7de7f82683934e91738e68e84aa9d7SHA1: dabf2c01bef31f1d0556eee3f73154b723124295SHA256: 437f5e5ac205013a5910c7249e9510ff6e6099e1e8ed335ddae3bede377576b3
Evidence Type Source Name Value Confidence
TermsAndConditionsRepository.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\repositories\TermsAndConditionsRepository.jsMD5: 234b94ed6d0586ce96c45e5da5e970cdSHA1: c5069cddd1a4bc706f85fd9d547b8eb6a01752e3SHA256: 34fc383b7c95dad7373543921b787c592dd61c9dc8430469d324e45988798837
Evidence Type Source Name Value Confidence
TermsAndConditionsSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\TermsAndConditionsSchema.jsMD5: d43e13e950b42607d96b734a46cf0312SHA1: 9136a6674687bd2c68a1d26f04289069e61b0848SHA256: aaf0d0a278d89f1dab1b53f232129c86feec4366123d79bf850c648196eaff64
Evidence Type Source Name Value Confidence
TermsAndConditionsServices.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAndConditionsServices.jsMD5: eb1d7c4d2df28f43822f52bc4f7b402dSHA1: ef8c1fd977adb33214dfdcfd655e7c5299dec39bSHA256: 2343e4a3e015817f7f35d32d00dbbac38aa565c7ef06bdc4fd852eb31e813062
Evidence Type Source Name Value Confidence
TermsAndConditionsStatus.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\TermsAndConditionsStatus.jsMD5: aa01557dfc6a744884f1ad00ecec69a4SHA1: 298ced3904f81e0b6bbb6d64adc9a06fa33bb189SHA256: 8eeca301bd7f1587f517b08ad8853f811b1dc9fc9dc0a54979701bb17a85a550
Evidence Type Source Name Value Confidence
Related Dependencies TermsAndConditionsStatus.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\TermsAndConditionsStatus.js MD5: aa01557dfc6a744884f1ad00ecec69a4 SHA1: 298ced3904f81e0b6bbb6d64adc9a06fa33bb189 SHA256: 8eeca301bd7f1587f517b08ad8853f811b1dc9fc9dc0a54979701bb17a85a550 TermsAndConditionsSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAndConditionsSwagger.jsMD5: c6771285d9882995e12ccf535fcceb08SHA1: 3f82ea241d18b3824d5f2302b1bfe7a4c20de442SHA256: 75a40f0be814cf7aaae0194481b673e69a5aaef2914fd028559593f8d15467fe
Evidence Type Source Name Value Confidence
TermsType.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\TermsType.jsMD5: 94cea1e65b5e751727adf342d40d9652SHA1: 4663ec1db2c091423ca82265445c97120ea9773aSHA256: 839a4fc9de726c2d5b8f89e5f1525e67644cf97ff1b5dc33b4b9249dbf2651ef
Evidence Type Source Name Value Confidence
Related Dependencies TermsType.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\TermsType.js MD5: 94cea1e65b5e751727adf342d40d9652 SHA1: 4663ec1db2c091423ca82265445c97120ea9773a SHA256: 839a4fc9de726c2d5b8f89e5f1525e67644cf97ff1b5dc33b4b9249dbf2651ef TestApiWebhookSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TestApiWebhookSwagger.jsMD5: c8ee6a10d1b96add643b14ee2058a5fdSHA1: f731080397708f8d82a83679e560307f50dad60dSHA256: ff21bd1dcc419db0b93272d6c4d3a5eb28e15a59a9ae683cf798d3922e96e0db
Evidence Type Source Name Value Confidence
TimeZone.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\TimeZone.jsMD5: 2ffe1905d3b123e6e67e17c9edb8ab6cSHA1: b02fcd951321ca9a7bb45a03ba9a9bef27664d09SHA256: 5dc79c964f67a6212483b54c89991ea8d3d74070232656112189bced1469b961
Evidence Type Source Name Value Confidence
UrlShortener.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\models\UrlShortener.jsMD5: d285734e8f81aa0ecde3828f7490ae4aSHA1: 90670abb49051374ccb5378c92343e943f729fe3SHA256: 8c8f8d8d02f70eb90362965981f13be9aac64edad8da422f02e2d41fed8dafd8
Evidence Type Source Name Value Confidence
UrlShortenerController.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\controllers\UrlShortenerController.jsMD5: 7397697c07c20c0190cc5d6ea90a8c80SHA1: dc503d5b8d3811be9c9d4f35542a61eeef396091SHA256: 2d958cbccf5bba4121def19749e3f651347522e54a2c8be4bb2837837e68b8ee
Evidence Type Source Name Value Confidence
UrlShortenerRepository.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\repositories\UrlShortenerRepository.jsMD5: 7aa0f647fab15c87701d46fbe0d3578bSHA1: 34825bf57348639eba18958f2295e1b980083bccSHA256: 87629563dd52e6f606501b6a27546169e7353e076e3608075f38a6be0ae1873a
Evidence Type Source Name Value Confidence
UrlShortenerSchema.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\schemas\UrlShortenerSchema.jsMD5: f289af3cea2237cc42a1d2bd63e42647SHA1: 40b2a6b692831a2d33c0bf4d0ebc202fcc5eae1fSHA256: f4084844a19d1ba41162de58f38f728ee55f26da964609986e9a834432e842ba
Evidence Type Source Name Value Confidence
UrlShortenerService.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\services\UrlShortenerService.jsMD5: e674e57e74cfb45f5f2cb07b8dcd94e6SHA1: 9bc1a6ec5cb6063bf559990a12e4bc7851a90a2eSHA256: 94766c7e9950b2767974ba0dbea6011e01ed6f2caddd074b230267f14fedcf8a
Evidence Type Source Name Value Confidence
UrlShortenerSwagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\UrlShortenerSwagger.jsMD5: 782d73f553897d749a7b07c883ec10ecSHA1: 9ae07a985473090907c4e538dd7150abb67cc564SHA256: a2e4a005f6b8f2876743b2545bc1e87a07009048d75be6a0bc7a33eb7d89eeca
Evidence Type Source Name Value Confidence
UrlShortenerValidationMessages.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\UrlShortenerValidationMessages.jsMD5: b866050cb193ab82ca9bcdb78baab79fSHA1: a62400e53c0ba03f1813c9a5595495168c6103eaSHA256: 47f357b9a8a1d21bfb6c3890dd8495a41b231553d6a5243c83246bb200d2a2da
Evidence Type Source Name Value Confidence
UserType.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\UserType.jsMD5: aac81810577b68a53de55fa9e1f309f6SHA1: 421291b3f968320d1852e2732eabe5118219c52bSHA256: 772f0c7149652fa2489fb831edb6ef1f631cbaf8b2f89c70c64e620faeabcdba
Evidence Type Source Name Value Confidence
WebhookEventHandler.Tests.csprojFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csprojMD5: 3dc7812cb6d48b0ad78f91529847db4fSHA1: 98645c01131de1e087e115ad127e69d4bc282f15SHA256: 0d1e21e66de017bd483aaccdeeded917f688004876290b279f96bc9ba3850e4e
Evidence Type Source Name Value Confidence Vendor file name WebhookEventHandler.Tests High Product file name WebhookEventHandler.Tests High
WebhookEventHandler.Tests.dllDescription:
WebhookEventHandler.Tests File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\WebhookEventHandler.Tests.dllMD5: ac855fcf4da450793ca87d4e09768faeSHA1: 6b52cacbae25a1eb12a9e23e48c9bc08734d1a65SHA256: 3200c6ad3723111146403a59a5497d1e758f1d8478c1a57d4261c2b16357fc06
Evidence Type Source Name Value Confidence Vendor dll namespace WebhookEventHandler.Tests Highest Vendor file name WebhookEventHandler.Tests High Vendor grokassembly CompanyName WebhookEventHandler.Tests Highest Vendor grokassembly FileDescription WebhookEventHandler.Tests Low Vendor grokassembly InternalName WebhookEventHandler.Tests.dll Low Vendor grokassembly OriginalFilename WebhookEventHandler.Tests.dll Low Vendor grokassembly ProductName WebhookEventHandler.Tests Medium Product dll namespace WebhookEventHandler.Tests Highest Product file name WebhookEventHandler.Tests High Product grokassembly CompanyName WebhookEventHandler.Tests Low Product grokassembly FileDescription WebhookEventHandler.Tests High Product grokassembly InternalName WebhookEventHandler.Tests.dll Medium Product grokassembly OriginalFilename WebhookEventHandler.Tests.dll Medium Product grokassembly ProductName WebhookEventHandler.Tests Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies WebhookEventHandler.Tests.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\obj\Debug\net6.0\WebhookEventHandler.Tests.dll MD5: ac855fcf4da450793ca87d4e09768fae SHA1: 6b52cacbae25a1eb12a9e23e48c9bc08734d1a65 SHA256: 3200c6ad3723111146403a59a5497d1e758f1d8478c1a57d4261c2b16357fc06 WebhookEventHandler.Tests.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\obj\Debug\net6.0\ref\WebhookEventHandler.Tests.dll MD5: 0bbf94ad472f2e9d1c7f81cd8b29bccf SHA1: 19d7914f55cf3c80e8db11c21a8d60f4e0a2b948 SHA256: 2b33dc7222733f17dfb210712591a9a1bea2a1c16d12a378565c77eecbd95c8c pkg:generic/WebhookEventHandler.Tests@1.0.0 WebhookEventHandler.Tests.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\obj\Debug\net6.0\refint\WebhookEventHandler.Tests.dll MD5: 0bbf94ad472f2e9d1c7f81cd8b29bccf SHA1: 19d7914f55cf3c80e8db11c21a8d60f4e0a2b948 SHA256: 2b33dc7222733f17dfb210712591a9a1bea2a1c16d12a378565c77eecbd95c8c WebhookEventHandler.csprojFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csprojMD5: 55587d88b88b4ffeb4d477504db3d9feSHA1: 99761575b1a922ee789157ade697859a8d2ec3d1SHA256: 846a5de691bfa96e038af2b7e653155d8651f011ce8315b6d12e55b6fc491ce1
Evidence Type Source Name Value Confidence Vendor file name WebhookEventHandler High Product file name WebhookEventHandler High
WebhookEventHandler.dllDescription:
WebhookEventHandler File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\WebhookEventHandler.dllMD5: 989430e3234d29f17e792a6f0fb4273aSHA1: 9d5619d51fb10bac42245135bdb0221f62040d82SHA256: 2a8be66e6a44857253c2f5e7aab8ce543a1a75c4cc36793453f8e5833bbf4908
Evidence Type Source Name Value Confidence Vendor dll namespace WebhookEventHandler Highest Vendor file name WebhookEventHandler High Vendor grokassembly CompanyName WebhookEventHandler Highest Vendor grokassembly FileDescription WebhookEventHandler Low Vendor grokassembly InternalName WebhookEventHandler.dll Low Vendor grokassembly OriginalFilename WebhookEventHandler.dll Low Vendor grokassembly ProductName WebhookEventHandler Medium Product dll namespace WebhookEventHandler Highest Product file name WebhookEventHandler High Product grokassembly CompanyName WebhookEventHandler Low Product grokassembly FileDescription WebhookEventHandler High Product grokassembly InternalName WebhookEventHandler.dll Medium Product grokassembly OriginalFilename WebhookEventHandler.dll Medium Product grokassembly ProductName WebhookEventHandler Highest Version AssemblyAnalyzer FilteredVersion 1.0.0 Highest Version grokassembly ProductVersion 1.0.0 Highest
Related Dependencies WebhookEventHandler.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\obj\Debug\net6.0\WebhookEventHandler.dll MD5: 989430e3234d29f17e792a6f0fb4273a SHA1: 9d5619d51fb10bac42245135bdb0221f62040d82 SHA256: 2a8be66e6a44857253c2f5e7aab8ce543a1a75c4cc36793453f8e5833bbf4908 WebhookEventHandler.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\obj\Debug\net6.0\ref\WebhookEventHandler.dll MD5: 79eafc552dd9599984eef6b90fa463d0 SHA1: 640adf1402135e21fc05fff503fe29dda46dd134 SHA256: 3ed739321fe68a4fa14e95c7caad12961a8340dd6ff78e1e3683f0b04aee5497 pkg:generic/WebhookEventHandler@1.0.0 WebhookEventHandler.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\obj\Debug\net6.0\refint\WebhookEventHandler.dll MD5: 79eafc552dd9599984eef6b90fa463d0 SHA1: 640adf1402135e21fc05fff503fe29dda46dd134 SHA256: 3ed739321fe68a4fa14e95c7caad12961a8340dd6ff78e1e3683f0b04aee5497 WebhookEventHandler.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\WebhookEventHandler.dll MD5: 989430e3234d29f17e792a6f0fb4273a SHA1: 9d5619d51fb10bac42245135bdb0221f62040d82 SHA256: 2a8be66e6a44857253c2f5e7aab8ce543a1a75c4cc36793453f8e5833bbf4908 WebhookEvents.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\WebhookEvents.jsMD5: d2cf1fa64dd01d4cae1c53a0f25d300eSHA1: a1545c1208ba2d7b566d79f26008b4040807d3d4SHA256: 22207d9c7ad41ce4a47703cf74dc769604ef7f21c1d4ce2e7d1083ec9c344cba
Evidence Type Source Name Value Confidence
allowedProcessMethodRepository.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\allowedProcessMethodRepository.jsMD5: fb96405f2f63b1fb6ad6c6e80bc07abaSHA1: c45ab65aac08e9c6fcc5cf5bc39ce2b07e13a7deSHA256: e74a8a8e64cdf0221941daae7c386a6099a9427826fff3bccf06d9a50c71eedf
Evidence Type Source Name Value Confidence
app.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\app.jsMD5: 83764dd32a9e4cce995442a801fdc7feSHA1: ff61630b9220f03174e1320f684d6a39c98bd41eSHA256: e74de97aeca4777bdfa39a789a5052f6868ee79c412105970207094d8216db5c
Evidence Type Source Name Value Confidence
core3.1.api.dllDescription:
core3.1.api File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.api.dllMD5: fbf39c4a4df7fc493a01034170edf849SHA1: ad7cbd474587e55c313aa54f2cb7d254e77783c3SHA256: 04ef122a557541705a24beaaf8b22ca018acb01a989d5bac21a340b7e8470720
Evidence Type Source Name Value Confidence Vendor file name core3.1.api High Vendor grokassembly CompanyName Aurionpro Highest Vendor grokassembly FileDescription core3.1.api Low Vendor grokassembly InternalName core3.1.api.dll Low Vendor grokassembly OriginalFilename core3.1.api.dll Low Vendor grokassembly ProductName core3.1.api Medium Product file name core3.1.api High Product grokassembly CompanyName Aurionpro Low Product grokassembly FileDescription core3.1.api High Product grokassembly InternalName core3.1.api.dll Medium Product grokassembly OriginalFilename core3.1.api.dll Medium Product grokassembly ProductName core3.1.api Highest Version AssemblyAnalyzer FilteredVersion 6.0.0.1 Highest Version grokassembly FileVersion 6.0.0.1 High Version grokassembly ProductVersion 6.0.0.1 Highest
core3.1.aws.dllDescription:
core3.1.aws File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.aws.dllMD5: 3c0c3fa76810f32f412dde3e45fd7e1fSHA1: e083763287a1965426d9fb3f0d6822a76a9ed4f5SHA256: 438003ced71775aee65617faf6c425b704b26e4712283bf7038abf58b6604078
Evidence Type Source Name Value Confidence Vendor file name core3.1.aws High Vendor grokassembly CompanyName Aurionpro Highest Vendor grokassembly FileDescription core3.1.aws Low Vendor grokassembly InternalName core3.1.aws.dll Low Vendor grokassembly OriginalFilename core3.1.aws.dll Low Vendor grokassembly ProductName core3.1.aws Medium Product file name core3.1.aws High Product grokassembly CompanyName Aurionpro Low Product grokassembly FileDescription core3.1.aws High Product grokassembly InternalName core3.1.aws.dll Medium Product grokassembly OriginalFilename core3.1.aws.dll Medium Product grokassembly ProductName core3.1.aws Highest Version AssemblyAnalyzer FilteredVersion 6.0.0.3 Highest Version grokassembly FileVersion 6.0.0.3 High Version grokassembly ProductVersion 6.0.0.3 Highest
Related Dependencies core3.1.aws.dllFile Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\core3.1.aws.dll MD5: 3c0c3fa76810f32f412dde3e45fd7e1f SHA1: e083763287a1965426d9fb3f0d6822a76a9ed4f5 SHA256: 438003ced71775aee65617faf6c425b704b26e4712283bf7038abf58b6604078 core3.1.aws.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\core3.1.aws.dll MD5: 3c0c3fa76810f32f412dde3e45fd7e1f SHA1: e083763287a1965426d9fb3f0d6822a76a9ed4f5 SHA256: 438003ced71775aee65617faf6c425b704b26e4712283bf7038abf58b6604078 core3.1.dllDescription:
core3.1 File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.dllMD5: 82fa5d78308c8b00fb74276048e6386aSHA1: 57e57ebb6b6dd0c62827d869e5d61ab981b622d6SHA256: fb3b161b7c5da0e7ee602b400371964a0e5e11855bd0bbc11387e4cc1915918f
Evidence Type Source Name Value Confidence Vendor file name core3.1 High Vendor grokassembly CompanyName Aurionpro Highest Vendor grokassembly FileDescription core3.1 Low Vendor grokassembly InternalName core3.1.dll Low Vendor grokassembly OriginalFilename core3.1.dll Low Vendor grokassembly ProductName core3.1 Medium Product file name core3.1 High Product grokassembly CompanyName Aurionpro Low Product grokassembly FileDescription core3.1 High Product grokassembly InternalName core3.1.dll Medium Product grokassembly OriginalFilename core3.1.dll Medium Product grokassembly ProductName core3.1 Highest Version AssemblyAnalyzer FilteredVersion 6.0.0.11 Highest Version grokassembly FileVersion 6.0.0.11 High Version grokassembly ProductVersion 6.0.0.11 Highest
Related Dependencies core3.1.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\core3.1.dll MD5: 82fa5d78308c8b00fb74276048e6386a SHA1: 57e57ebb6b6dd0c62827d869e5d61ab981b622d6 SHA256: fb3b161b7c5da0e7ee602b400371964a0e5e11855bd0bbc11387e4cc1915918f core3.1.dllDescription:
core3.1 File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\core3.1.dllMD5: adf76eabc0cbb7253f0b0300da50ddfeSHA1: 10bcca71648dae26f3d9930215c55ec84d35dc73SHA256: fecaef540c399b8446ffaf7f244ccfef7c6c5c19cd4836f4365f936c0fa81cd2
Evidence Type Source Name Value Confidence Vendor file name core3.1 High Vendor grokassembly CompanyName Aurionpro Highest Vendor grokassembly FileDescription core3.1 Low Vendor grokassembly InternalName core3.1.dll Low Vendor grokassembly OriginalFilename core3.1.dll Low Vendor grokassembly ProductName core3.1 Medium Product file name core3.1 High Product grokassembly CompanyName Aurionpro Low Product grokassembly FileDescription core3.1 High Product grokassembly InternalName core3.1.dll Medium Product grokassembly OriginalFilename core3.1.dll Medium Product grokassembly ProductName core3.1 Highest Version AssemblyAnalyzer FilteredVersion 6.0.0.8 Highest Version grokassembly FileVersion 6.0.0.8 High Version grokassembly ProductVersion 6.0.0.8 Highest
Related Dependencies core3.1.dllFile Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\core3.1.dll MD5: adf76eabc0cbb7253f0b0300da50ddfe SHA1: 10bcca71648dae26f3d9930215c55ec84d35dc73 SHA256: fecaef540c399b8446ffaf7f244ccfef7c6c5c19cd4836f4365f936c0fa81cd2 core3.1.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\core3.1.dll MD5: adf76eabc0cbb7253f0b0300da50ddfe SHA1: 10bcca71648dae26f3d9930215c55ec84d35dc73 SHA256: fecaef540c399b8446ffaf7f244ccfef7c6c5c19cd4836f4365f936c0fa81cd2 coverlet.collector:1.2.0File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id collector Low Vendor msbuild id coverlet Medium Vendor msbuild id coverlet.collector Medium Product msbuild id collector Medium Product msbuild id coverlet.collector Highest Version msbuild version 1.2.0 Highest
database.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\db\database.jsMD5: 6011964e01cf6d6d90d7a3b4c8c74fdaSHA1: 279acbec98b514d1366d6aeb2568a46c484bce61SHA256: da1b703d25214c68a6bcda3f66c3e37a58556bed40bef488ee88e5a4c7b3ff6d
Evidence Type Source Name Value Confidence
database.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\database.jsMD5: 14008e4d451995a9b7e9cf0bf7a47e5bSHA1: 205bf5f6c0fdc17a609ba6f4d7765911fc88757aSHA256: fc7a9ce5074a74c1ec2ff59cba8012fafd3287a3039cd585020ca474de8b74ef
Evidence Type Source Name Value Confidence
database.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\db\database.jsMD5: 2f3d9983a534c97d1ede297f5adb7e59SHA1: 2b077b0a66f5b9fa9e1c9910c78afe4d1b7944ffSHA256: 8deea7599a27450842a910ff94ecfbb277797c21f471fe305f4eac4a5ca3d4a6
Evidence Type Source Name Value Confidence
Related Dependencies database.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\db\database.js MD5: 2f3d9983a534c97d1ede297f5adb7e59 SHA1: 2b077b0a66f5b9fa9e1c9910c78afe4d1b7944ff SHA256: 8deea7599a27450842a910ff94ecfbb277797c21f471fe305f4eac4a5ca3d4a6 database.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\db\database.js MD5: 2f3d9983a534c97d1ede297f5adb7e59 SHA1: 2b077b0a66f5b9fa9e1c9910c78afe4d1b7944ff SHA256: 8deea7599a27450842a910ff94ecfbb277797c21f471fe305f4eac4a5ca3d4a6 database.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\db\database.jsMD5: 4a33fab811daa9cb2f23d9eaca54174aSHA1: 27ff9afe31cfb7a340b91d586b5627f69e033699SHA256: e2b7316b66267d61fca4e273fabf6b1f9e3399c1cfa39ca6f5d60c631c97860e
Evidence Type Source Name Value Confidence
e_sqlite3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-arm64\native\e_sqlite3.dllMD5: 87776aa83dd0b7c7c0d107086019e23cSHA1: d23e9a5e7faf8ab63304650ee427536c814cbbdfSHA256: 7be069b83dbd374867b6e4384b359e108e91518f7a74553ddd31b053921ab42b
Evidence Type Source Name Value Confidence Vendor file name e_sqlite3 High Product file name e_sqlite3 High Version file name e_sqlite3 Medium Version file version 3 Medium
CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
e_sqlite3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-arm\native\e_sqlite3.dllMD5: 5dd768fd40b38f44e16e898b52ab6635SHA1: 987c6c9dfee3ad5a983298cb2c01372870610e62SHA256: 618ae75967acf2053fde3c74b2d96c4e6c097675c3a725ebc5605521df296fbc
Evidence Type Source Name Value Confidence Vendor file name e_sqlite3 High Product file name e_sqlite3 High Version file name e_sqlite3 Medium Version file version 3 Medium
CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
e_sqlite3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-x64\native\e_sqlite3.dllMD5: 6ea08a0e0affdeab1889e153402b97e2SHA1: 8e05d4e52f42b34c485f1c8ac7ce8b0304053f7fSHA256: 29029877dce20e985487b1805733d72e0962e6a5cb72796b52a52628aed085d5
Evidence Type Source Name Value Confidence Vendor file name e_sqlite3 High Product file name e_sqlite3 High Version file name e_sqlite3 Medium Version file version 3 Medium
CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
e_sqlite3.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-x86\native\e_sqlite3.dllMD5: 03a62e86903e0c125a4f190be476c674SHA1: 9f8ee1eefd87584649447f4fcb1699098e2d6496SHA256: d2e0558e63ac31bd4ed01e4db7107812808b17c0223455c00482f631c0b43339
Evidence Type Source Name Value Confidence Vendor file name e_sqlite3 High Product file name e_sqlite3 High Version file name e_sqlite3 Medium Version file version 3 Medium
CVE-2017-10989 suppress
The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact. CWE-125 Out-of-bounds Read
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - ISSUE_TRACKING,PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions:
CVE-2019-19646 suppress
pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns. CWE-754 Improper Check for Unusual or Exceptional Conditions
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-11656 suppress
In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement. CWE-416 Use After Free
CVSSv3:
Base Score: CRITICAL (9.8) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2015-5895 suppress
Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors. NVD-CWE-noinfo
CVSSv2:
Base Score: HIGH (10.0) Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C References:
Vulnerable Software & Versions:
CVE-2018-20346 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - ISSUE_TRACKING,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - ISSUE_TRACKING,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY Vulnerable Software & Versions: (show all )
CVE-2018-20506 suppress
SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: HIGH (8.1) Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3414 suppress
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. CWE-908 Use of Uninitialized Resource
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3415 suppress
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement. CWE-404 Improper Resource Shutdown or Release
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - BROKEN_LINK af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - BROKEN_LINK cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3416 suppress
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. CWE-190 Integer Overflow or Wraparound
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-3717 suppress
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors. CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVSSv2:
Base Score: HIGH (7.5) Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,PATCH,VENDOR_ADVISORY product-security@apple.com - MAILING_LIST,VENDOR_ADVISORY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - THIRD_PARTY_ADVISORY,VDB_ENTRY product-security@apple.com - VENDOR_ADVISORY product-security@apple.com - VENDOR_ADVISORY Vulnerable Software & Versions:
CVE-2018-20505 suppress
SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY,VDB_ENTRY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - VENDOR_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY,VDB_ENTRY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY cve@mitre.org - VENDOR_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2018-8740 suppress
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-11655 suppress
SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled. CWE-665 Improper Initialization
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.0) Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2022-35737 suppress
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. CWE-129 Improper Validation of Array Index
CVSSv3:
Base Score: HIGH (7.5) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A References:
Vulnerable Software & Versions: (show all )
CVE-2023-7104 suppress
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999. CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow
CVSSv3:
Base Score: HIGH (7.3) Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (5.2) Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2020-13630 suppress
ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature. CWE-416 Use After Free
CVSSv3:
Base Score: HIGH (7.0) Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.4) Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2015-6607 suppress
SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586. CWE-264 Permissions, Privileges, and Access Controls
CVSSv2:
Base Score: MEDIUM (6.8) Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2016-6153 suppress
os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files. CWE-20 Improper Input Validation
CVSSv3:
Base Score: MEDIUM (5.9) Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A CVSSv2:
Base Score: MEDIUM (4.6) Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P References:
Vulnerable Software & Versions:
CVE-2019-19645 suppress
alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements. CWE-674 Uncontrolled Recursion
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-13434 suppress
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c. CWE-190 Integer Overflow or Wraparound
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,PATCH,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13435 suppress
SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions:
CVE-2020-13631 suppress
SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c. NVD-CWE-noinfo
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N References:
af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MITIGATION,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - RELEASE_NOTES,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MITIGATION,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PERMISSIONS_REQUIRED,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - RELEASE_NOTES,THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
CVE-2020-13632 suppress
ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query. CWE-476 NULL Pointer Dereference
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
Vulnerable Software & Versions: (show all )
CVE-2020-15358 suppress
In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation. CWE-787 Out-of-bounds Write
CVSSv3:
Base Score: MEDIUM (5.5) Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A CVSSv2:
Base Score: LOW (2.1) Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P References:
af854a3a-2127-422b-91ae-364da2661108 - EXPLOIT,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - MAILING_LIST,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - PATCH,VENDOR_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY af854a3a-2127-422b-91ae-364da2661108 - THIRD_PARTY_ADVISORY cve@mitre.org - EXPLOIT,VENDOR_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - MAILING_LIST,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,THIRD_PARTY_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - PATCH,VENDOR_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY cve@mitre.org - THIRD_PARTY_ADVISORY Vulnerable Software & Versions: (show all )
enumHelper.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\enumHelper.jsMD5: 54e74d48a3a86a3847ad42f9185dcb7fSHA1: f295664633c18d37c12c7cf95d242b4a86cf5211SHA256: 24f12d32b7835a7fb714bb48bbfe057c17439d390d50d1e6414aa898b2dd1cc3
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\index.jsMD5: b409ea6455d8dd8a0887db667bee9e7dSHA1: b7a67013e7364a1f79d9ff8a9035f86da77f685eSHA256: a7910bc72eb7c11abdf36937f765f52af1ec42017aa47bf331866afe76ba9b20
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\index.jsMD5: 75d2c932dacfdf14add52a46a1c767fcSHA1: 996e08c11e4ef9e63440e856c0bff404ad3bf0beSHA256: ed9e29926530c57624033907c819d92170d08d54f9d3efdd6d2046da34ec9e22
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\index.jsMD5: 2315a4178319af3808c4e269f1498d29SHA1: 236e1a21e94fcedb2b9beee99a3c828c6bad69f7SHA256: 241b4675c2de1d1291c9935ba9be2e1aba351d570237cb2c2c353f6514b323bd
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\index.jsMD5: d67c3c52392959628346a7e0227e346fSHA1: 47359941645725fe549d17ce35acedd619947c5bSHA256: c48a1fed7281f54835422b19a741b2628531d9f2ea7e23558b5fa7a9fed8e448
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\index.jsMD5: 1e6744bbf644a256113c8bb355bbeac9SHA1: 3d208788fdf39ab8f7522693884bfed0292db1d6SHA256: 3a4de9a29c861a1b2eca1244139075abd92de04f9d991d10b2ef7d0c8b4f873a
Evidence Type Source Name Value Confidence
index.jsFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\index.jsMD5: a5575dc3babbc574cf3d2c4e72dd5b6eSHA1: af6658b112abfbca841e3208c76b4a8b5372556aSHA256: 61f2faa461e2d584330e5957a94195896c07f4737e5827c00f2fcb79a98ab65d
Evidence Type Source Name Value Confidence
knex.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\db\knex.jsMD5: 0d89878b0a957c455c285d89167f0648SHA1: 229634ed241c3faae5474912fe60dcdf5593aa36SHA256: c78bd45902199f1159966ac1f8866a09253b1d55c901311479a41eb71a1c033a
Evidence Type Source Name Value Confidence
knexfile.jsFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\db\knexfile.jsMD5: a8012005729b0351fc354092967de84cSHA1: 16aada6b44c8e4ef2a276be6bb03c064f914c784SHA256: 55f9834fd993e146c69053c1f272576708536c5ec947500c12dd13c134858d37
Evidence Type Source Name Value Confidence
knexfile.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\db\knexfile.jsMD5: 4b2ce4276ccd3484a5d2b4eae3c2879dSHA1: 6ad94f8fd95b769e23ae929f5119306413a59261SHA256: e9a1a177bdb5ef12207fdf61ff81edc1cbd297fd502fc68d256c1b161ac72db4
Evidence Type Source Name Value Confidence
knexfile.jsFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\db\knexfile.jsMD5: e1e372638d8075e2a79c7219928bd46fSHA1: a37c3fdc3ec688bfa0bcf107f36e11823550f03bSHA256: d55ec49a6c7844d323a5f385d60575f8d98c35a09dd53003181e45be9569972c
Evidence Type Source Name Value Confidence
knexfile.jsFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\db\knexfile.jsMD5: 6c04d16103a2fd520f3e200009bc5824SHA1: 82199613dca24acd10ba5c55dee23d1cca617cc9SHA256: bf032d74eef26bf88ffa43210b61a568406caab1889ab3e8285b758c5a318c92
Evidence Type Source Name Value Confidence
lambda.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\lambda.jsMD5: 25c0be513d88cddfcaaad10a1b8c2c1eSHA1: 2838374a3782b45a8e84d4180aac5397b8037fd4SHA256: 0617340e2c15bb39122b059d40b858ca3aca4e91df59e7bcb2ebcfd1cd091d3d
Evidence Type Source Name Value Confidence
merchantHandler.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\merchantHandler.jsMD5: 5012cc9a27117958a61dc80d0f32599aSHA1: 05bd9b8b7ec1a9422b59db51482fcd6c37485025SHA256: 600982c946280fb74aa3b0d9a101f0973231d38af333ca7283ec31cd4377e434
Evidence Type Source Name Value Confidence
merchantRepository.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\merchantRepository.jsMD5: 25ac65d729560097529fbc19b634adb6SHA1: 512fb04873d8c25c2e7d2ffd0f5d976a50ce1cadSHA256: 5d73a12d277ea8a907fc158625340ffdbe6e408dcf762a8cb6b10ab8226bd3f4
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\package.jsonMD5: 49e3b0e60b5dbdc14420d405a6b72043SHA1: 768766febcde99bc6827f791419d642520e4a5dcSHA256: 0de83e15fe46d1b540861cb545b11c18272eabb61b8bfdfef408e95416f0631f
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\MastersAPI\package.jsonMD5: 7c2c35e1988e2a0a6c2fc3ba94d4db77SHA1: 4030c46862a99ee869a914767806517b5410e039SHA256: fe916e6fb9913e21754b24cbfdda9388d9b026d7a60caec3c5ff61214cee1394
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\package.jsonMD5: a7377e0610237dffe432d2a2d17a0ea3SHA1: cb9914b0021e3a884fa99bd2466f0ddf46455398SHA256: 6f58823a55fbdfac13e32c8358a1379e75cf33a8f56b45c8f68bae7f2c965649
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\package.jsonMD5: d9f86edc7e6069df3c8f652593605d57SHA1: cb60f5f21120f5eda4400e40aa11ef6422240f75SHA256: 7ede9a4cf2d4d217dc04ca5f4f3822bbcdfada3f07a691226ed09affc492ea7f
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\package.jsonMD5: 55068878e06bfc18c2f2ead867969badSHA1: ff79bcf7b22da930e03bf0ececf732974cf9a40aSHA256: c2a9f1056fab99cc2e6027fb15287f6fbfdeea7e682df1b336f7fdeeae53db9b
Evidence Type Source Name Value Confidence
package.jsonFile Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\package.jsonMD5: 7d441516540426d9cbb11edd96824d02SHA1: 7f53ae313acf247dc5c308c05f07e5a2723e4efbSHA256: cbdf768e2f6378ce1a8d1e5cda21596f053315dc4d584119794c5769e725199d
Evidence Type Source Name Value Confidence
paymentConfigurationFormRepository.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\paymentConfigurationFormRepository.jsMD5: 6d09bf319aa19e1be48aca83256cd1cfSHA1: 4df939e28d3e6972dcfc4b19ca4c6efc75cb4b8dSHA256: 1a229c91707b9b745224651a3febe2ce42df8319ef31afee92b9fe12a1a78330
Evidence Type Source Name Value Confidence
paymentFormConfigurationDefaultSettingsRepository.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\paymentFormConfigurationDefaultSettingsRepository.jsMD5: fbaec553f6e11e521400b9d6a6937aefSHA1: df3bc1a0c2abfe1c95a5c9603c28eb5de86b9433SHA256: 0caf971a9672dc73f1d074cf004b1af7e6e0e19d7006ec364cf193d10fc45bfc
Evidence Type Source Name Value Confidence
swagger.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger.jsMD5: 8c966df86ee27632be72505b900f5916SHA1: 9763a3faecb7eb413fff25dc9b64d48180ad717dSHA256: 2361cc5e66651683d9f2ad44475939cb656919330e9eda7752d39bceeb20a068
Evidence Type Source Name Value Confidence
swaggerDefinition.jsFile Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\swaggerDefinition.jsMD5: af76e9ca2050dad393bc3dfc56ae55c5SHA1: 7fe2baabb8d197f2d13319717c8ec0925eaa178aSHA256: 75d3237630db4bd2279cd1eacfee36685607abe3f68a7731bf7aac6177a9fddb
Evidence Type Source Name Value Confidence
termsAndConditionsRepository.jsFile Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\termsAndConditionsRepository.jsMD5: 8328f5621350618a7f34142ace902295SHA1: 9e3491a7bcaed2571fc74857d7b39e312f0e2a66SHA256: 867c7fba473f83dda4c0260dd86f3fb85baa555871d3b744e684871ceaf04aa0
Evidence Type Source Name Value Confidence
testhost.dllDescription:
testhost File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\testhost.dllMD5: d9889d118d8d97b5cfc7f9a20f52a180SHA1: 2d249e0828ffdb0008df87041b846a4dec11e9cbSHA256: af85d164a295ef4018a8388b3b3873b9c47d07c2dc86df73cc0f30dd7b3c2eef
Evidence Type Source Name Value Confidence Vendor file name testhost High Vendor grokassembly CompanyName Microsoft Corporation Highest Vendor grokassembly FileDescription testhost Low Vendor grokassembly InternalName testhost.dll Low Vendor grokassembly OriginalFilename testhost.dll Low Vendor grokassembly ProductName Microsoft.TestHost Medium Product file name testhost High Product grokassembly CompanyName Microsoft Corporation Low Product grokassembly FileDescription testhost High Product grokassembly InternalName testhost.dll Medium Product grokassembly OriginalFilename testhost.dll Medium Product grokassembly ProductName Microsoft.TestHost Highest Version grokassembly FileVersion 15.0.0 High
Related Dependencies testhost.dllFile Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\testhost.dll MD5: 563702aa3cf5996512c446a663879187 SHA1: 993fe58396306c65156dc394b5966c506736b863 SHA256: a14ac9b6a5afb5f89576174897fc12e82f8eff6ecd744698c53fb6f68319a731 pkg:generic/testhost@15.0.0 testhost.dllFile Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\testhost.dll MD5: 9e3b6c0c1c6083115518638435fdea07 SHA1: ef741eb8c0398698da9965f359d71938b283feec SHA256: 4b9404bb74615f941216aa0840deaa331d83839c325c452eee6fef11a31c08a8 pkg:generic/testhost@15.0.0 xunit.abstractions.dllDescription:
xUnit.net Abstractions (PCL) File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.abstractions.dllMD5: e3b2baab8aa8b05b47a10b492dc361abSHA1: 0d9302f5baa697b21e7da1818a4f5fb997bba9bcSHA256: bef20106f1efa62f697977c9e3cc848be752931b52b8e48ff557f6f9862c9ec1
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit.Abstractions Highest Vendor file name xunit.abstractions High Vendor grokassembly CompanyName Outercurve Foundation Highest Vendor grokassembly FileDescription xUnit.net Abstractions (PCL) Low Vendor grokassembly InternalName xunit.abstractions.dll Low Vendor grokassembly OriginalFilename xunit.abstractions.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit.Abstractions Highest Product file name xunit.abstractions High Product grokassembly CompanyName Outercurve Foundation Low Product grokassembly FileDescription xUnit.net Abstractions (PCL) High Product grokassembly InternalName xunit.abstractions.dll Medium Product grokassembly OriginalFilename xunit.abstractions.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.0.0.0 Highest Version grokassembly FileVersion 2.0.0.0 High Version grokassembly ProductVersion 2.0.0.0 Highest
xunit.assert.dllDescription:
xUnit.net Assertion Library File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.assert.dllMD5: 1dcdd2fd045a7fdf577b23287bdce780SHA1: bfe54ffecf536a47b39c83fa80228adc1981a7c4SHA256: 3c42330fc4657b1c12a83b7f487aaed39c7362aef34811b3a8a350817137ac2f
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor file name xunit.assert High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Assertion Library Low Vendor grokassembly InternalName xunit.assert.dll Low Vendor grokassembly OriginalFilename xunit.assert.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product file name xunit.assert High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Assertion Library High Product grokassembly InternalName xunit.assert.dll Medium Product grokassembly OriginalFilename xunit.assert.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.core.dllDescription:
xUnit.net Core File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.core.dllMD5: 37f41e0637bab35b11ec20603b108ffbSHA1: a92d377185862578297f267955a6e5618028935fSHA256: 6cefb7283e54a9b0738172a1451416afa03893395d513bc74a9250398acd8be4
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor file name xunit.core High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Core Low Vendor grokassembly InternalName xunit.core.dll Low Vendor grokassembly OriginalFilename xunit.core.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product file name xunit.core High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Core High Product grokassembly InternalName xunit.core.dll Medium Product grokassembly OriginalFilename xunit.core.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.execution.dotnet.dllDescription:
xUnit.net Execution (dotnet) File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.execution.dotnet.dllMD5: 4c739d2d874a0382c528f8394f1741b3SHA1: d7c8b6eb3dabde46d30970892422fc81da7ad3e4SHA256: 79ee217b43f69cc6bce3c7365f50717f6638ffe0cb1807f74f09d6025e42cd39
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor file name xunit.execution.dotnet High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Execution (dotnet) Low Vendor grokassembly InternalName xunit.execution.dotnet.dll Low Vendor grokassembly OriginalFilename xunit.execution.dotnet.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product file name xunit.execution.dotnet High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Execution (dotnet) High Product grokassembly InternalName xunit.execution.dotnet.dll Medium Product grokassembly OriginalFilename xunit.execution.dotnet.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.runner.reporters.netcoreapp10.dllDescription:
xUnit.net Runner Reporters (.NET Core 1.0) File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.reporters.netcoreapp10.dllMD5: 5e4d7b11a4e9e5cba20ff025d4975677SHA1: 6f082257f4b060dbbb40c78be4d095743f5e5c41SHA256: db75d39d557442d5425d28c92e846c97b22ff366458148e8eef103c5d2834064
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor dll namespace Xunit.Runner.Reporters Highest Vendor file name xunit.runner.reporters.netcoreapp10 High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Runner Reporters (.NET Core 1.0) Low Vendor grokassembly InternalName xunit.runner.reporters.netcoreapp10.dll Low Vendor grokassembly OriginalFilename xunit.runner.reporters.netcoreapp10.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product dll namespace Xunit.Runner.Reporters Highest Product file name xunit.runner.reporters.netcoreapp10 High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Runner Reporters (.NET Core 1.0) High Product grokassembly InternalName xunit.runner.reporters.netcoreapp10.dll Medium Product grokassembly OriginalFilename xunit.runner.reporters.netcoreapp10.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.runner.utility.netcoreapp10.dllDescription:
xUnit.net Runner Utility (.NET Core 1.0) File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.utility.netcoreapp10.dllMD5: 8569a556d47acae61b77d06d0af97227SHA1: b86ca8bf747e485382bd6c500a964d43cbd4da92SHA256: 727f9f94a644a389441728c9815126e0b898c6059de6199afbba54e92b0d6ef3
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor file name xunit.runner.utility.netcoreapp10 High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Runner Utility (.NET Core 1.0) Low Vendor grokassembly InternalName xunit.runner.utility.netcoreapp10.dll Low Vendor grokassembly OriginalFilename xunit.runner.utility.netcoreapp10.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product file name xunit.runner.utility.netcoreapp10 High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Runner Utility (.NET Core 1.0) High Product grokassembly InternalName xunit.runner.utility.netcoreapp10.dll Medium Product grokassembly OriginalFilename xunit.runner.utility.netcoreapp10.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.runner.visualstudio.dotnetcore.testadapter.dllDescription:
xUnit.net Runner for Visual Studio (.NET Core 1.0) File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.visualstudio.dotnetcore.testadapter.dllMD5: fc0a2e411e0bea13a8a48049bafa0377SHA1: c56760657b70d1a7e3617ff0b30cd5c19270f401SHA256: d25fa141f326253ef50cecdd6c94fddc94f867c6d028c157cbc884eda12f57d0
Evidence Type Source Name Value Confidence Vendor dll namespace Xunit Highest Vendor dll namespace Xunit.Runner.VisualStudio Highest Vendor file name xunit.runner.visualstudio.dotnetcore.testadapter High Vendor grokassembly CompanyName .NET Foundation Highest Vendor grokassembly FileDescription xUnit.net Runner for Visual Studio (.NET Core 1.0) Low Vendor grokassembly InternalName xunit.runner.visualstudio.dotnetcore.testadapter.dll Low Vendor grokassembly OriginalFilename xunit.runner.visualstudio.dotnetcore.testadapter.dll Low Vendor grokassembly ProductName xUnit.net Testing Framework Medium Product dll namespace Xunit Highest Product dll namespace Xunit.Runner.VisualStudio Highest Product file name xunit.runner.visualstudio.dotnetcore.testadapter High Product grokassembly CompanyName .NET Foundation Low Product grokassembly FileDescription xUnit.net Runner for Visual Studio (.NET Core 1.0) High Product grokassembly InternalName xunit.runner.visualstudio.dotnetcore.testadapter.dll Medium Product grokassembly OriginalFilename xunit.runner.visualstudio.dotnetcore.testadapter.dll Medium Product grokassembly ProductName xUnit.net Testing Framework Highest Version AssemblyAnalyzer FilteredVersion 2.3.1 Highest Version grokassembly ProductVersion 2.3.1 Highest
xunit.runner.visualstudio:2.3.1File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id runner Low Vendor msbuild id runner.visualstudio Low Vendor msbuild id xunit Medium Vendor msbuild id xunit.runner.visualstudio Medium Product msbuild id runner Medium Product msbuild id runner.visualstudio Medium Product msbuild id xunit.runner.visualstudio Highest Version msbuild version 2.3.1 Highest
xunit:2.3.1File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj
Evidence Type Source Name Value Confidence Vendor msbuild id xunit Medium Vendor msbuild id xunit Low Product msbuild id xunit Highest Version msbuild version 2.3.1 Highest