Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: Testing

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
.eslintrc.js 00
.eslintrc.js 00
20200417143047_initial-fee.js 00
20200420145657_initial-tax.js 00
20200515105426_update-default-amount-column.js 00
20201019191043_terms-and-conditions.js 00
20201105122857_accepted-terms.js 00
20201109193632_update-termsandconditions-column-EffectiveFromDate-EffectiveToDate-dateTodatetime.js 00
20201111174715_add-termsandconditions-column-SubEntityId-SubEntityType.js 00
20201118164959_termsandconditions-remove-column-MerchantId-PartnerId-add-column-ParentId.js 00
20201119111521_update-termsandconditions-and-acceptedterms-table.js 00
20201119122825_termsandconditions-removeColumn-SubEntityType-addTO-acceptedterms-table.js 00
20201119135126_update-termsandconditions-column-EntityTypeToConfigurerType.js 00
20201119135243_add-userType-parentId-Column-in-acceptTerms.js 00
20201119190055_acceptedterms-remove-column-MerchantId-PartnerId.js 00
20201206230212_add-column-Browser-acceptedterms.js 00
20201209154021_add-new-columns-in-acceptedTerms.js 00
20210211150909_add-column-EntityVersion-in-acceptedterms-table.js 00
20210330095707_add-tax-on-fees.js 00
20210408232444_url-shortener.js 00
20210421174340_change-url-datatype.js 00
20210421181819_change-length-fees-taxes.js 00
APF.Core3.1.API:6.0.0.*pkg:nuget/APF.Core3.1.API@6.0.0.%2A 08
APF.Core3.1.AWS:6.0.0.*pkg:nuget/APF.Core3.1.AWS@6.0.0.%2A 08
APF.Core3.1:6.0.0.12pkg:nuget/APF.Core3.1@6.0.0.12 08
AWSSDK.CloudWatch.dllcpe:2.3:a:web_project:web:3.7.2.10:*:*:*:*:*:*:*pkg:generic/AWSSDK.CloudWatch@3.7.2.10 0Low13
AWSSDK.CloudWatchEvents.dllpkg:generic/AWSSDK.CloudWatchEvents@3.7.3.21 013
AWSSDK.CloudWatchLogs.dllcpe:2.3:a:web_project:web:3.7.1.29:*:*:*:*:*:*:*pkg:generic/AWSSDK.CloudWatchLogs@3.7.1.29 0Low13
AWSSDK.CognitoIdentity.dllcpe:2.3:a:web_project:web:3.7.0.2:*:*:*:*:*:*:*pkg:generic/AWSSDK.CognitoIdentity@3.7.0.2 0Low13
AWSSDK.CognitoIdentityProvider.dllcpe:2.3:a:web_project:web:3.7.1.26:*:*:*:*:*:*:*pkg:generic/AWSSDK.CognitoIdentityProvider@3.7.1.26 0Low13
AWSSDK.Core.dllcpe:2.3:a:web_project:web:3.7.100.22:*:*:*:*:*:*:*pkg:generic/AWSSDK.Core@3.7.100.22 0Low21
AWSSDK.Core.dllcpe:2.3:a:web_project:web:3.7.12.7:*:*:*:*:*:*:*pkg:generic/AWSSDK.Core@3.7.12.7 0Low15
AWSSDK.Extensions.NETCore.Setup.dllpkg:generic/AWSSDK.Extensions.NETCore.Setup@3.7.1 013
AWSSDK.Extensions.NETCore.Setup.dllpkg:generic/AWSSDK.Extensions.NETCore.Setup@3.3.100.0 013
AWSSDK.Extensions.NETCore.Setup:3.7.2pkg:nuget/AWSSDK.Extensions.NETCore.Setup@3.7.2 08
AWSSDK.KeyManagementService.dllcpe:2.3:a:service_project:service:3.7.100.22:*:*:*:*:*:*:*pkg:generic/AWSSDK.KeyManagementService@3.7.100.22 0Low19
AWSSDK.Kinesis.dllcpe:2.3:a:web_project:web:3.7.0.0:*:*:*:*:*:*:*pkg:generic/AWSSDK.Kinesis@3.7.0.0 0Low13
AWSSDK.Lambda.dllcpe:2.3:a:amazon:aws_lambda:3.7.101.2:*:*:*:*:*:*:*pkg:generic/AWSSDK.Lambda@3.7.101.2 0Low19
AWSSDK.Lambda.dllcpe:2.3:a:amazon:aws_lambda:3.7.3.3:*:*:*:*:*:*:*pkg:generic/AWSSDK.Lambda@3.7.3.3 0Low13
AWSSDK.RDS.dllcpe:2.3:a:web_project:web:3.7.104.3:*:*:*:*:*:*:*pkg:generic/AWSSDK.RDS@3.7.104.3 0Low19
AWSSDK.RDS.dllcpe:2.3:a:web_project:web:3.7.103.1:*:*:*:*:*:*:*pkg:generic/AWSSDK.RDS@3.7.103.1 0Low19
AWSSDK.S3.dllpkg:generic/AWSSDK.S3@3.7.9.23 021
AWSSDK.SQS.dllcpe:2.3:a:web_project:web:3.7.0.55:*:*:*:*:*:*:*pkg:generic/AWSSDK.SQS@3.7.0.55 0Low13
AWSSDK.SecurityToken.dllpkg:generic/AWSSDK.SecurityToken@3.7.0.2 013
AWSSDK.SimpleNotificationService.dllcpe:2.3:a:service_project:service:3.7.2.25:*:*:*:*:*:*:*pkg:generic/AWSSDK.SimpleNotificationService@3.7.2.25 0Low13
AWSSDK.SimpleSystemsManagement.dllpkg:generic/AWSSDK.SimpleSystemsManagement@3.7.20.6 019
AWSSDK.SimpleSystemsManagement.dllpkg:generic/AWSSDK.SimpleSystemsManagement@3.7.0.2 013
AcceptTermsCommunicationService.js 00
AcceptTermsSchema.js 00
AcceptedTermsAndConditionsListener.js 00
AllowedProcessMethod.js 00
Amazon.AspNetCore.DataProtection.SSM.dllcpe:2.3:a:asp-project:asp-project:2.1.0:*:*:*:*:*:*:*pkg:generic/Amazon.AspNetCore.DataProtection.SSM@2.1.0 0Low16
Amazon.Lambda.APIGatewayEvents.dllcpe:2.3:a:web_project:web:1.2.0.0:*:*:*:*:*:*:*pkg:generic/Amazon.Lambda.APIGatewayEvents@1.2.0.0 0Low15
Amazon.Lambda.ApplicationLoadBalancerEvents.dllpkg:generic/Amazon.Lambda.ApplicationLoadBalancerEvents@0.0.0.0 09
Amazon.Lambda.AspNetCoreServer.dllcpe:2.3:a:asp-project:asp-project:2.0.4:*:*:*:*:*:*:*pkg:generic/Amazon.Lambda.AspNetCoreServer@2.0.4 0Low15
Amazon.Lambda.AspNetCoreServer:6.1.0cpe:2.3:a:asp-project:asp-project:6.1.0:*:*:*:*:*:*:*pkg:nuget/Amazon.Lambda.AspNetCoreServer@6.1.0 0Low8
Amazon.Lambda.CloudWatchEvents.dllpkg:generic/Amazon.Lambda.CloudWatchEvents@0.0.0.0 09
Amazon.Lambda.Core.dllcpe:2.3:a:web_project:web:1.0.0.0:*:*:*:*:*:*:*pkg:generic/Amazon.Lambda.Core@1.0.0.0 0Low15
Amazon.Lambda.Core:2.1.0pkg:nuget/Amazon.Lambda.Core@2.1.0 08
Amazon.Lambda.DynamoDBEvents:2.0.0pkg:nuget/Amazon.Lambda.DynamoDBEvents@2.0.0 08
Amazon.Lambda.KinesisAnalyticsEvents.dllpkg:generic/Amazon.Lambda.KinesisAnalyticsEvents@0.0.0.0 09
Amazon.Lambda.KinesisFirehoseEvents.dllpkg:generic/Amazon.Lambda.KinesisFirehoseEvents@0.0.0.0 09
Amazon.Lambda.LexEvents.dllpkg:generic/Amazon.Lambda.LexEvents@0.0.0.0 09
Amazon.Lambda.Logging.AspNetCore.dllcpe:2.3:a:asp-project:asp-project:2.0.0.0:*:*:*:*:*:*:*pkg:generic/Amazon.Lambda.Logging.AspNetCore@2.0.0.0 0Low15
Amazon.Lambda.S3Events.dllpkg:generic/Amazon.Lambda.S3Events@1.0.0.0 015
Amazon.Lambda.Serialization.SystemTextJson.dllpkg:generic/Amazon.Lambda.Serialization.SystemTextJson@0.0.0.0 09
Amazon.Lambda.Serialization.SystemTextJson:2.1.0pkg:nuget/Amazon.Lambda.Serialization.SystemTextJson@2.1.0 08
Amazon.Lambda.TestUtilities.dllpkg:generic/Amazon.Lambda.TestUtilities@1.0.0.0 013
Amazon.Lambda.TestUtilities:2.0.0pkg:nuget/Amazon.Lambda.TestUtilities@2.0.0 08
AutoMapper.Extensions.Microsoft.DependencyInjection.dllpkg:generic/AutoMapper.Extensions.Microsoft.DependencyInjection@7.0.0 023
AutoMapper.dllpkg:generic/AutoMapper@9.0.0 015
AwsParameterStore.Microsoft.Extensions.Configuration.dllpkg:generic/AwsParameterStore.Microsoft.Extensions.Configuration@0.7.0 026
BaseCommunicationService.js 00
BaseModel.js 00
BaseModel.js 00
Castle.Core.dllpkg:generic/Castle.Core@4.3.1 017
Castle.Core.dllpkg:generic/Castle.Core@4.2.1 017
Category.js 00
Category.js 00
CommonService.js 00
CommonUtil.js 00
CommonUtility.js 00
CommonUtility.js 00
CommonValidationMessages.js 00
CommonValidationMessages.js 00
ConfigurerType.js 00
CountriesSwagger.js 00
CustomErrors.js 00
CustomErrors.js 00
CustomQueryBuilder.js 00
CustomerEventHandler.js 00
CustomerEvents.js 00
CustomerFlexFieldValueSwagger.js 00
CustomerRepository.js 00
CustomerRepository.js 00
Customers.js 00
DefaultMerchantTax.js 00
DefaultMerchantTaxAssembler.js 00
DefaultMerchantTaxController.js 00
DefaultMerchantTaxRepository.js 00
DefaultMerchantTaxSchema.js 00
DefaultMerchantTaxServices.js 00
DefaultMerchantTaxSwagger.js 00
EntityType.js 00
EventType.js 00
EventType.js 00
ExceptionMapper.js 00
ExceptionMapper.js 00
Fee.js 00
FeeAssembler.js 00
FeeConfigurationValidationMessage.js 00
FeeController.js 00
FeeRepository.js 00
FeeSchema.js 00
FeeServices.js 00
FeeSwagger.js 00
FeeType.js 00
FieldValidation.js 00
FlexFieldValueSwagger.js 00
FlexFields.js 00
FluentValidation.AspNetCore.dllcpe:2.3:a:asp-project:asp-project:9.2.0:*:*:*:*:*:*:*pkg:generic/FluentValidation.AspNetCore@9.2.0 0Low15
FluentValidation.AspNetCore:11.0.0cpe:2.3:a:asp-project:asp-project:11.0.0:*:*:*:*:*:*:*pkg:nuget/FluentValidation.AspNetCore@11.0.0 0Low6
FluentValidation.DependencyInjectionExtensions.dllpkg:generic/FluentValidation.DependencyInjectionExtensions@9.2.0 015
FluentValidation.dllpkg:generic/FluentValidation@9.2.0 015
Frequency.js 00
Hashids.net.dllpkg:generic/Hashids.net@1.3.0 020
Humanizer.dllpkg:generic/Humanizer@2.8.26 015
InternalCommunicationService.js 00
Lumigo.DotNET.Instrumentation.dllpkg:generic/Lumigo.DotNET.Instrumentation@1.0.0 016
Lumigo.DotNET.Parser.dllpkg:generic/Lumigo.DotNET.Parser@1.0.0 016
Lumigo.DotNET.Utilities.dllpkg:generic/Lumigo.DotNET.Utilities@1.0.0 016
Lumigo.DotNET.dllpkg:generic/Lumigo.DotNET@1.0.45 022
MSTest.TestAdapter:1.3.2pkg:nuget/MSTest.TestAdapter@1.3.2 06
MSTest.TestAdapter:2.1.0pkg:nuget/MSTest.TestAdapter@2.1.0 06
MSTest.TestFramework:1.3.2pkg:nuget/MSTest.TestFramework@1.3.2 06
MSTest.TestFramework:2.1.0pkg:nuget/MSTest.TestFramework@2.1.0 06
Masters.API.Tests.csproj 02
Masters.API.Tests.dllpkg:generic/Masters.API.Tests@1.0.0 014
Masters.API.csproj 02
Masters.API.dllpkg:generic/Masters.API@1.0.0 016
Masters.API.exe 02
Masters.Tests.csproj 02
Masters.Tests.dllpkg:generic/Masters.Tests@1.0.0 014
Masters.csproj 02
Masters.dllpkg:generic/Masters@1.0.0 014
Merchant.js 00
MerchantFlexFields.js 00
MerchantRepository.js 00
MerchantWebhookSubscriptionSwagger.js 00
Microsoft.AspNetCore.Authentication.JwtBearer.dllcpe:2.3:a:asp-project:asp-project:3.100.320.16314:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:3.100.320.16314:*:*:*:*:*:*:*
pkg:generic/Microsoft.AspNetCore.Authentication.JwtBearer@3.100.320.16314 0Low15
Microsoft.AspNetCore.Authentication.JwtBearer:3.1.3cpe:2.3:a:asp-project:asp-project:3.1.3:*:*:*:*:*:*:*pkg:nuget/Microsoft.AspNetCore.Authentication.JwtBearer@3.1.3LOW1Low8
Microsoft.AspNetCore.Hosting.Server.Abstractions.dllcpe:2.3:a:asp-project:asp-project:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:2.0.3:*:*:*:*:*:*:*
pkg:generic/Microsoft.AspNetCore.Hosting.Server.Abstractions@2.0.3 0Low15
Microsoft.AspNetCore.JsonPatch.dllcpe:2.3:a:asp-project:asp-project:3.100.19.56601:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:3.100.19.56601:*:*:*:*:*:*:*
pkg:generic/Microsoft.AspNetCore.JsonPatch@3.100.19.56601 0Low15
Microsoft.AspNetCore.Mvc.NewtonsoftJson:3.1.0cpe:2.3:a:asp-project:asp-project:3.1.0:*:*:*:*:*:*:*pkg:nuget/Microsoft.AspNetCore.Mvc.NewtonsoftJson@3.1.0 0Low8
Microsoft.DotNet.PlatformAbstractions.dllpkg:generic/Microsoft.DotNet.PlatformAbstractions@1.0.1 09
Microsoft.EntityFrameworkCore.Abstractions.dllpkg:generic/Microsoft.EntityFrameworkCore.Abstractions@6.0.10 016
Microsoft.EntityFrameworkCore.Abstractions.dllpkg:generic/Microsoft.EntityFrameworkCore.Abstractions@6.0.11 016
Microsoft.EntityFrameworkCore.Design.dllpkg:generic/Microsoft.EntityFrameworkCore.Design@6.0.10 026
Microsoft.EntityFrameworkCore.Relational.dllpkg:generic/Microsoft.EntityFrameworkCore.Relational@6.0.10 024
Microsoft.EntityFrameworkCore.Relational.dllpkg:generic/Microsoft.EntityFrameworkCore.Relational@6.0.11 016
Microsoft.EntityFrameworkCore.Sqlite.dllcpe:2.3:a:sqlite:sqlite:6.0.11:*:*:*:*:*:*:*pkg:generic/Microsoft.EntityFrameworkCore.Sqlite@6.0.11 0Low24
Microsoft.EntityFrameworkCore.dllpkg:generic/Microsoft.EntityFrameworkCore@6.0.10 022
Microsoft.EntityFrameworkCore.dllpkg:generic/Microsoft.EntityFrameworkCore@6.0.11 016
Microsoft.Extensions.Caching.Abstractions.dllpkg:generic/Microsoft.Extensions.Caching.Abstractions@6.0.21.52210 017
Microsoft.Extensions.Caching.Memory.dllpkg:generic/Microsoft.Extensions.Caching.Memory@6.0.2 015
Microsoft.Extensions.Configuration.Abstractions.dllpkg:generic/Microsoft.Extensions.Configuration.Abstractions@6.0.21.52210 015
Microsoft.Extensions.Configuration.EnvironmentVariables.dllpkg:generic/Microsoft.Extensions.Configuration.EnvironmentVariables@6.0.2 017
Microsoft.Extensions.Configuration.EnvironmentVariables:6.0.1pkg:nuget/Microsoft.Extensions.Configuration.EnvironmentVariables@6.0.1 08
Microsoft.Extensions.Configuration.FileExtensions.dllpkg:generic/Microsoft.Extensions.Configuration.FileExtensions@6.0.21.52210 015
Microsoft.Extensions.Configuration.Json.dllpkg:generic/Microsoft.Extensions.Configuration.Json@6.0.21.52210 017
Microsoft.Extensions.Configuration.Json:6.0.0pkg:nuget/Microsoft.Extensions.Configuration.Json@6.0.0 08
Microsoft.Extensions.Configuration.dllpkg:generic/Microsoft.Extensions.Configuration@6.0.3 015
Microsoft.Extensions.Configuration:6.0.1pkg:nuget/Microsoft.Extensions.Configuration@6.0.1 08
Microsoft.Extensions.DependencyInjection.Abstractions.dllpkg:generic/Microsoft.Extensions.DependencyInjection.Abstractions@6.0.21.52210 015
Microsoft.Extensions.DependencyInjection.dllpkg:generic/Microsoft.Extensions.DependencyInjection@6.0.10 015
Microsoft.Extensions.DependencyModel.dllpkg:generic/Microsoft.Extensions.DependencyModel@6.0.21.52210 015
Microsoft.Extensions.DependencyModel.dllpkg:generic/Microsoft.Extensions.DependencyModel@1.0.1 09
Microsoft.Extensions.FileProviders.Abstractions.dllpkg:generic/Microsoft.Extensions.FileProviders.Abstractions@6.0.21.52210 015
Microsoft.Extensions.FileProviders.Abstractions.dllpkg:generic/Microsoft.Extensions.FileProviders.Abstractions@2.0.1 015
Microsoft.Extensions.FileProviders.Physical.dllpkg:generic/Microsoft.Extensions.FileProviders.Physical@6.0.21.52210 017
Microsoft.Extensions.FileSystemGlobbing.dllpkg:generic/Microsoft.Extensions.FileSystemGlobbing@6.0.21.52210 015
Microsoft.Extensions.Hosting.Abstractions.dllcpe:2.3:a:microsoft:.net_core:2.0.3:*:*:*:*:*:*:*pkg:generic/Microsoft.Extensions.Hosting.Abstractions@2.0.3 0Low15
Microsoft.Extensions.Hosting:3.1.3pkg:nuget/Microsoft.Extensions.Hosting@3.1.3 08
Microsoft.Extensions.Logging.Abstractions.dllpkg:generic/Microsoft.Extensions.Logging.Abstractions@6.0.3 017
Microsoft.Extensions.Logging.Abstractions:6.0.1pkg:nuget/Microsoft.Extensions.Logging.Abstractions@6.0.1 08
Microsoft.Extensions.Logging.dllpkg:generic/Microsoft.Extensions.Logging@6.0.21.52210 015
Microsoft.Extensions.Logging:6.0.0pkg:nuget/Microsoft.Extensions.Logging@6.0.0 08
Microsoft.Extensions.Options.dllpkg:generic/Microsoft.Extensions.Options@6.0.21.52210 015
Microsoft.Extensions.PlatformAbstractions.dllpkg:generic/Microsoft.Extensions.PlatformAbstractions@1.1.0 021
Microsoft.Extensions.Primitives.dllpkg:generic/Microsoft.Extensions.Primitives@6.0.21.52210 015
Microsoft.IdentityModel.JsonWebTokens.dllcpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:json_web_token_project:json_web_token:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
pkg:generic/Microsoft.IdentityModel.JsonWebTokens@5.6.0.61018MEDIUM1Low16
Microsoft.IdentityModel.Protocols.OpenIdConnect.dllcpe:2.3:a:identitymodel_project:identitymodel:5.5.0.60624:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identity_model:5.5.0.60624:*:*:*:*:*:*:*
pkg:generic/Microsoft.IdentityModel.Protocols.OpenIdConnect@5.5.0.60624MEDIUM1Low16
Microsoft.IdentityModel.Protocols.dllcpe:2.3:a:identitymodel_project:identitymodel:5.5.0.60624:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identity_model:5.5.0.60624:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identitymodel:5.5.0.60624:*:*:*:*:*:*:*
pkg:generic/Microsoft.IdentityModel.Protocols@5.5.0.60624MEDIUM1Low16
Microsoft.IdentityModel.Tokens.dllcpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
pkg:generic/Microsoft.IdentityModel.Tokens@5.6.0.61018MEDIUM1Low16
Microsoft.NET.Test.Sdk:15.5.0pkg:nuget/Microsoft.NET.Test.Sdk@15.5.0 08
Microsoft.NET.Test.Sdk:15.8.0pkg:nuget/Microsoft.NET.Test.Sdk@15.8.0 08
Microsoft.NET.Test.Sdk:16.5.0pkg:nuget/Microsoft.NET.Test.Sdk@16.5.0 08
Microsoft.TestPlatform.CrossPlatEngine.dllcpe:2.3:a:testplatform_project:testplatform:15.0.0:*:*:*:*:*:*:*pkg:generic/Microsoft.TestPlatform.CrossPlatEngine@15.0.0 0Low14
Microsoft.TestPlatform.CrossPlatEngine.resources.dllcpe:2.3:a:testplatform_project:testplatform:15.0.0:*:*:*:*:*:*:*pkg:generic/Microsoft.TestPlatform.CrossPlatEngine.resources@15.0.0 0Low13
Microsoft.VisualStudio.CodeCoverage.Shim.dllpkg:generic/Microsoft.VisualStudio.CodeCoverage.Shim@16.0.28223.3002 017
Microsoft.VisualStudio.CodeCoverage.Shim.dllpkg:generic/Microsoft.VisualStudio.CodeCoverage.Shim@15.0.27718.3008 017
Microsoft.VisualStudio.CodeCoverage.Shim.dllpkg:generic/Microsoft.VisualStudio.CodeCoverage.Shim@15.0.26228.0 017
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllcpe:2.3:a:microsoft:services:14.0.4503.01:*:*:*:*:*:*:*
cpe:2.3:a:testplatform_project:testplatform:14.0.4503.01:*:*:*:*:*:*:*
pkg:generic/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface@14.0.4503.01 0Low17
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dllcpe:2.3:a:microsoft:services:14.0.2505.01:*:*:*:*:*:*:*
cpe:2.3:a:testplatform_project:testplatform:14.0.2505.01:*:*:*:*:*:*:*
pkg:generic/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface@14.0.2505.01 0Low15
Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dllcpe:2.3:a:testplatform_project:testplatform:14.0.0.0:*:*:*:*:*:*:*pkg:generic/Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices@14.0.0.0 0Low15
Microsoft.VisualStudio.TestPlatform.TestFramework.dllcpe:2.3:a:testplatform_project:testplatform:14.0.4503.01:*:*:*:*:*:*:*pkg:generic/Microsoft.VisualStudio.TestPlatform.TestFramework@14.0.4503.01 0Low15
Microsoft.VisualStudio.TestPlatform.TestFramework.dllcpe:2.3:a:testplatform_project:testplatform:14.0.2505.01:*:*:*:*:*:*:*pkg:generic/Microsoft.VisualStudio.TestPlatform.TestFramework@14.0.2505.01 0Low13
Moq.dllpkg:generic/Moq@4.9.0 020
Moq.dllpkg:generic/Moq@4.8.2 020
MySqlConnector.dllcpe:2.3:a:mysql:mysql:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:www-sql_project:www-sql:2.1.2:*:*:*:*:*:*:*
pkg:generic/MySqlConnector@2.1.2HIGH11Low15
Newtonsoft.Json.Bson.dllcpe:2.3:a:newtonsoft:json.net:1.0.2:*:*:*:*:*:*:*pkg:generic/Newtonsoft.Json.Bson@1.0.2HIGH1Low15
Newtonsoft.Json.dllcpe:2.3:a:newtonsoft:json.net:13.0.1:*:*:*:*:*:*:*pkg:generic/Newtonsoft.Json@13.0.1 0Low22
NuGet.Frameworks.dllcpe:2.3:a:microsoft:nuget:5.0.0:*:*:*:*:*:*:*pkg:generic/NuGet.Frameworks@5.0.0MEDIUM1Low15
Occurrence.js 00
Partner.js 00
PartnerCustomerMapping.js 00
PartnerCustomerMappingRepository.js 00
PartnerCustomerMappingRepository.js 00
PartnerHandler.js 00
PartnerRepository.js 00
PartnerRepository.js 00
PartnerStatus.js 00
PartnerStatus.js 00
PaymentFormConfigurationSwagger.js 00
Pomelo.EntityFrameworkCore.MySql.dllcpe:2.3:a:mysql:mysql:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:www-sql_project:www-sql:6.0.2:*:*:*:*:*:*:*
pkg:generic/Pomelo.EntityFrameworkCore.MySql@6.0.2 0Low22
ProductStatus.js 00
RegisterFeeRoutes.js 00
RegisterTaxRoutes.js 00
RegisterTermsAndConditionsRoutes.js 00
RegisterUrlRoutes.js 00
Reseller.js 00
ResellerHandler.js 00
ResellerRepository.js 00
SQLitePCLRaw.core.dllcpe:2.3:a:sqlite:sqlite:2.0.6:*:*:*:*:*:*:*pkg:generic/SQLitePCLRaw.core@2.0.6CRITICAL24Low12
SQLitePCLRaw.provider.e_sqlite3.dllcpe:2.3:a:sqlite:sqlite:2.0.6:*:*:*:*:*:*:*pkg:generic/SQLitePCLRaw.provider.e_sqlite3@2.0.6CRITICAL24High12
SSMParameters.js 00
SSMParameters.js 00
SSMParameters.js 00
SSMParameters.js 00
SSMParameters.js 00
StatesSwagger.js 00
SubEntityType.js 00
SwaggerController.js 00
System.IdentityModel.Tokens.Jwt.dllcpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*
pkg:generic/System.IdentityModel.Tokens.Jwt@5.6.0.61018MEDIUM1Low16
System.IdentityModel.Tokens.Jwt:5.6.0cpe:2.3:a:identitymodel_project:identitymodel:5.6.0:*:*:*:*:*:*:*pkg:nuget/System.IdentityModel.Tokens.Jwt@5.6.0MEDIUM1Low8
System.Security.Cryptography.Xml.dllpkg:generic/System.Security.Cryptography.Xml@4.6.26418.02 018
System.Xml.XPath.XmlDocument.dllpkg:generic/System.Xml.XPath.XmlDocument@1.0.24212.01 020
SystemInfoRepository.js 00
Tax.js 00
TaxAssembler.js 00
TaxCalculationSrvice.js 00
TaxConfigurationValidationMessage.js 00
TaxController.js 00
TaxRepository.js 00
TaxServices.js 00
TaxSwagger.js 00
TaxType.js 00
TermConfigurationValidationMessage.js 00
TermsAcceptance.js 00
TermsAcceptance.js 00
TermsAcceptanceAssembler.js 00
TermsAcceptanceController.js 00
TermsAcceptanceRepository.js 00
TermsAcceptanceRepository.js 00
TermsAcceptanceService.js 00
TermsAcceptanceSwagger.js 00
TermsAcceptanceValidationMessages.js 00
TermsAndConditionHandler.js 00
TermsAndConditions.js 00
TermsAndConditions.js 00
TermsAndConditions.js 00
TermsAndConditionsAssembler.js 00
TermsAndConditionsController.js 00
TermsAndConditionsDocument.js 00
TermsAndConditionsDocumentController.js 00
TermsAndConditionsDocumentSchema.js 00
TermsAndConditionsDocumentService.js 00
TermsAndConditionsDocumentSwagger.js 00
TermsAndConditionsDocumentValidationMessages.js 00
TermsAndConditionsRepository.js 00
TermsAndConditionsRepository.js 00
TermsAndConditionsRepository.js 00
TermsAndConditionsRepository.js 00
TermsAndConditionsSchema.js 00
TermsAndConditionsServices.js 00
TermsAndConditionsStatus.js 00
TermsAndConditionsSwagger.js 00
TermsType.js 00
TestApiWebhookSwagger.js 00
TimeZone.js 00
UrlShortener.js 00
UrlShortenerController.js 00
UrlShortenerRepository.js 00
UrlShortenerSchema.js 00
UrlShortenerService.js 00
UrlShortenerSwagger.js 00
UrlShortenerValidationMessages.js 00
UserType.js 00
WebhookEventHandler.Tests.csproj 02
WebhookEventHandler.Tests.dllpkg:generic/WebhookEventHandler.Tests@1.0.0 016
WebhookEventHandler.csproj 02
WebhookEventHandler.dllpkg:generic/WebhookEventHandler@1.0.0 016
WebhookEvents.js 00
allowedProcessMethodRepository.js 00
app.js 00
core3.1.api.dllpkg:generic/core3.1.api@6.0.0.1 015
core3.1.aws.dllpkg:generic/core3.1.aws@6.0.0.3 015
core3.1.dllpkg:generic/core3.1@6.0.0.11 015
core3.1.dllpkg:generic/core3.1@6.0.0.8 015
coverlet.collector:1.2.0pkg:nuget/coverlet.collector@1.2.0 06
database.js 00
database.js 00
database.js 00
database.js 00
e_sqlite3.dllcpe:2.3:a:sqlite:sqlite:3:*:*:*:*:*:*:*CRITICAL24High4
e_sqlite3.dllcpe:2.3:a:sqlite:sqlite:3:*:*:*:*:*:*:*CRITICAL24High4
e_sqlite3.dllcpe:2.3:a:sqlite:sqlite:3:*:*:*:*:*:*:*CRITICAL24High4
e_sqlite3.dllcpe:2.3:a:sqlite:sqlite:3:*:*:*:*:*:*:*CRITICAL24High4
enumHelper.js 00
index.js 00
index.js 00
index.js 00
index.js 00
index.js 00
index.js 00
knex.js 00
knexfile.js 00
knexfile.js 00
knexfile.js 00
knexfile.js 00
lambda.js 00
merchantHandler.js 00
merchantRepository.js 00
package.json 00
package.json 00
package.json 00
package.json 00
package.json 00
package.json 00
paymentConfigurationFormRepository.js 00
paymentFormConfigurationDefaultSettingsRepository.js 00
swagger.js 00
swaggerDefinition.js 00
termsAndConditionsRepository.js 00
testhost.dllpkg:generic/testhost@15.0.0 013
xunit.abstractions.dllpkg:generic/xunit.abstractions@2.0.0.0 017
xunit.assert.dllpkg:generic/xunit.assert@2.3.1 016
xunit.core.dllpkg:generic/xunit.core@2.3.1 016
xunit.execution.dotnet.dllpkg:generic/xunit.execution.dotnet@2.3.1 016
xunit.runner.reporters.netcoreapp10.dllpkg:generic/xunit.runner.reporters.netcoreapp10@2.3.1 018
xunit.runner.utility.netcoreapp10.dllpkg:generic/xunit.runner.utility.netcoreapp10@2.3.1 016
xunit.runner.visualstudio.dotnetcore.testadapter.dllpkg:generic/xunit.runner.visualstudio.dotnetcore.testadapter@2.3.1 018
xunit.runner.visualstudio:2.3.1pkg:nuget/xunit.runner.visualstudio@2.3.1 08
xunit:2.3.1pkg:nuget/xunit@2.3.1 04

Dependencies (vulnerable)

.eslintrc.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\.eslintrc.js
MD5: 23d57c74621904a627062cf1e81894f7
SHA1: d3f2ef224ef6a87840a046943ea40a92351069b0
SHA256:6b2b8b841373af965896bda684d5285e3e1e4d38eed40a796de227cdc7be06fd

Identifiers

  • None

.eslintrc.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\.eslintrc.js
MD5: e546ced8387100f30125207b9f544205
SHA1: 73d9d6152706d9bdc215593268075b5611a55f37
SHA256:7f43dfa73cc6993570ea09d565e5863dbb2d740a75e484e15f082561a0cbe8b4

Identifiers

  • None

20200417143047_initial-fee.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200417143047_initial-fee.js
MD5: be7d78c4148ce1f9079dd937a7cf093a
SHA1: 4adf459d9c1b9d7bba1c39084192027c57d2b598
SHA256:07d22be985dca8d29e940f7456b4ef9aef52c0e2759c1852e131d966dbe410f0

Identifiers

  • None

20200420145657_initial-tax.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200420145657_initial-tax.js
MD5: 71177975709c04924a8e94f659efd280
SHA1: 7eaa9a9f58e0e8bb7eb6af56117957df0fcf5c12
SHA256:0726dc8576c8390d9cfb76fd22f20d5937a5a5265b8e4b7ca54d8d644c2d26ec

Identifiers

  • None

20200515105426_update-default-amount-column.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20200515105426_update-default-amount-column.js
MD5: 7f7c62f1e8c28685ef3e8295a9b101ab
SHA1: 15d0568341094cf1576b5ad40d14235a7a0d42ca
SHA256:dab15d1b1418418988883f8c0405339b82e437f7a2616cf05957d9f4fadca0fe

Identifiers

  • None

20201019191043_terms-and-conditions.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201019191043_terms-and-conditions.js
MD5: 0a0ea08bd79f96959a399cedcfa82ceb
SHA1: 76df3ccbe76c787ea22740b1034d11ecbe814308
SHA256:fffe904a3bb76bf108fe9d76f050db95f1d21c0891c3280c88029afce6ac2d55

Identifiers

  • None

20201105122857_accepted-terms.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201105122857_accepted-terms.js
MD5: f2a99f7533845a672588dc36540d7c40
SHA1: 578b59da7f12bdd6996f00a1a07dcf7a7b7089b8
SHA256:adb47b8e6c5126a1b85c75c4528b84fb5320217a3ae62332802fde2a7c802dc7

Identifiers

  • None

20201109193632_update-termsandconditions-column-EffectiveFromDate-EffectiveToDate-dateTodatetime.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201109193632_update-termsandconditions-column-EffectiveFromDate-EffectiveToDate-dateTodatetime.js
MD5: 54755c710ccb7dfe2681b743b83e73f3
SHA1: 953f7eec8cb4c2212900633144cc3aa8a5bc02e1
SHA256:7ee78959b3a7aae61f21bee4396654dcc742582abc1e996089cbc7764961f6f3

Identifiers

  • None

20201111174715_add-termsandconditions-column-SubEntityId-SubEntityType.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201111174715_add-termsandconditions-column-SubEntityId-SubEntityType.js
MD5: ef8d57141b3f603f7e01c19a6892dfd4
SHA1: fa5d77bcc8629aedc6d993b41186c34ef5d5ce9d
SHA256:9d27c167eabe891335c2ea68a7fc6c4aba67ae319941688981806c9d0d492b3f

Identifiers

  • None

20201118164959_termsandconditions-remove-column-MerchantId-PartnerId-add-column-ParentId.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201118164959_termsandconditions-remove-column-MerchantId-PartnerId-add-column-ParentId.js
MD5: a65f27b5812df00a7481825a0cfefa5f
SHA1: 4d1718a5d47c6b4627c8d095bac91c3f9180c75e
SHA256:9d28948b54fe534bab9998504d64c4e1495c5b162e2e02dbff5fc75d52077947

Identifiers

  • None

20201119111521_update-termsandconditions-and-acceptedterms-table.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119111521_update-termsandconditions-and-acceptedterms-table.js
MD5: 86896faad8a2b28416ecf0294261c039
SHA1: 78314a95c3ac95a7d9f29ce3e0e05016660ca5cc
SHA256:185b53817cc092f58cd5e00ebb15bb9c8abcec0da336442f5a01cda2facd7069

Identifiers

  • None

20201119122825_termsandconditions-removeColumn-SubEntityType-addTO-acceptedterms-table.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119122825_termsandconditions-removeColumn-SubEntityType-addTO-acceptedterms-table.js
MD5: 23ddf4d952ece266915e1d48628aa538
SHA1: 39238d57a852bed9ef2cf2367782a3c59f4f8317
SHA256:67af1f4a067227bcedaacbf6c4212fc7be1162850524c570956e7b9c5ae90c1e

Identifiers

  • None

20201119135126_update-termsandconditions-column-EntityTypeToConfigurerType.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119135126_update-termsandconditions-column-EntityTypeToConfigurerType.js
MD5: a5586e7c9333c290e27f05f0c22f44ba
SHA1: 88b674361f23a7d0e92f598ee97149e08fda0b0f
SHA256:fedcb6a031b21fc73c36735e26e195368a91c9dc94a1e34e7a1ffef297a4676c

Identifiers

  • None

20201119135243_add-userType-parentId-Column-in-acceptTerms.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119135243_add-userType-parentId-Column-in-acceptTerms.js
MD5: 441000fb8e642bb56fb91b6601025874
SHA1: 25044af0e557d5a9cc20ac298a07e011f665b401
SHA256:f02b104c6e5c87ac45e95cca89ab96e115ac7a1ee1f7fce90755077ae75e046d

Identifiers

  • None

20201119190055_acceptedterms-remove-column-MerchantId-PartnerId.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201119190055_acceptedterms-remove-column-MerchantId-PartnerId.js
MD5: 65f554ee36b4d44fe2261913bc9e0df0
SHA1: c27ce64d6947e6b393493c0f5841413f44855244
SHA256:c77d7d216e6635c3d026057ee3453a7077b92379efb063db4e52756ba3fd73a7

Identifiers

  • None

20201206230212_add-column-Browser-acceptedterms.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201206230212_add-column-Browser-acceptedterms.js
MD5: 71f624c0694e9ca1cd4829cb76a8d8e7
SHA1: 46f32d704666ef461fb52d2e59d6a23941c2e75b
SHA256:a3391abb852151bdf75e6bac36f4b20fbcc973f8c5652fb4e8aec8dc0ec9572e

Identifiers

  • None

20201209154021_add-new-columns-in-acceptedTerms.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20201209154021_add-new-columns-in-acceptedTerms.js
MD5: aa998adc7c90fd7e2e16d954bd97d630
SHA1: e4e3f3c14939e838d9254c12bae98c69f5a2f2ba
SHA256:4b92a22aed9b39422a546376a840be2a2fce8690be31b4412ec58311cf67723b

Identifiers

  • None

20210211150909_add-column-EntityVersion-in-acceptedterms-table.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210211150909_add-column-EntityVersion-in-acceptedterms-table.js
MD5: 21d11a3ae6be0be7bfde3c5fdf55907d
SHA1: c5c2fa8fe1c86faa92d1f68f27cd9b3dd279f2ab
SHA256:9e9667dde204f9f713775d3d610f590bc715b9fe9adabd291a41482e38048ebd

Identifiers

  • None

20210330095707_add-tax-on-fees.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210330095707_add-tax-on-fees.js
MD5: 8b40ac434eb5e681b7c16036e9a7f505
SHA1: 6dee606fd85fd57381646c41d9f3a847e360c192
SHA256:42e1aaa286ff761f8a27db833ab21e88acaa26a54d7dbf1dfb05722087b7efeb

Identifiers

  • None

20210408232444_url-shortener.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210408232444_url-shortener.js
MD5: 26dad0197b24ad39c914ce7450582d76
SHA1: 7be820618d950c6e2f54e757c9742ca99d87197e
SHA256:b777c509c2845846a94507033f874b24bbed8576e9f4cb59af37825c942ba41b

Identifiers

  • None

20210421174340_change-url-datatype.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210421174340_change-url-datatype.js
MD5: 69b05e21ce9cb591b64b53f9e799945f
SHA1: a41e1a9cf39360ad7502c8f26458395bceb3a4d3
SHA256:e916d56a31e56dfb3fe9795365b050915b66f552e3fafa8df99a66e5018ae8a7

Identifiers

  • None

20210421181819_change-length-fees-taxes.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\migrations\20210421181819_change-length-fees-taxes.js
MD5: ccfc41e8f536b1d727ef9cb62a7afcae
SHA1: b94d9011abf27e562ae1e6b3b1eafd587a650ada
SHA256:62cd204a3931b3b2117016178baf59b2f858190ff01ae9e8982c8a2916bb378c

Identifiers

  • None

APF.Core3.1.API:6.0.0.*

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

APF.Core3.1.AWS:6.0.0.*

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj

Identifiers

APF.Core3.1:6.0.0.12

File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj

Identifiers

AWSSDK.CloudWatch.dll

Description:

AWSSDK.CloudWatch

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch. Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, and set alarms.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatch.dll
MD5: 9d23346785b3396e8b59177713590423
SHA1: e84faaba12a5b79db1ab580fe8ea6c6b93d1fe03
SHA256:6486f279a31e811c144890f932cb7044f286bc803c5f8a988b62adb1c25ebc24

Identifiers

AWSSDK.CloudWatchEvents.dll

Description:

AWSSDK.CloudWatchEvents

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch Events. Amazon CloudWatch Events helps you to respond to state changes in your AWS resources. When your resources change state they automatically send events into an event stream. You can create rules that match selected events in the stream and route them to targets to take action. You can also use rules to take action on a pre-determined schedule.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatchEvents.dll
MD5: 6b1541f7461a9a513a718285e86d42ac
SHA1: 92cf5b4de876b4ba45d86aa0dc2e58659a4d57db
SHA256:331bbc34798197ca2ca68d0aa081227f4f030c610a5ff84227462021bf852f7b

Identifiers

AWSSDK.CloudWatchLogs.dll

Description:

AWSSDK.CloudWatchLogs

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon CloudWatch Logs. Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. You can use Amazon CloudWatch to collect and track metrics, collect and monitor log files, and set alarms.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CloudWatchLogs.dll
MD5: c2d546dcd8bb37c54e2bfe6362bc2ac9
SHA1: a7387ef1a89f6cedd3e195c5d328520049ada04f
SHA256:b7232938714e18b2f44e14db68d4528a6e346db67a71067159bedfb87ea9af24

Identifiers

AWSSDK.CognitoIdentity.dll

Description:

AWSSDK.CognitoIdentity

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Cognito Identity. Amazon Cognito is a service that makes it easy to save user data, such as app preferences or game state, in the AWS Cloud without writing any backend code or managing any infrastructure. With Amazon Cognito, you can focus on creating great app experiences instead of having to worry about building and managing a backend solution to handle identity management, network state, storage, and sync.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CognitoIdentity.dll
MD5: 077d87642ad4a529f29c588103e1e9e9
SHA1: 5f457ed88006ef6cd8754e8009ec90ee88ec4222
SHA256:245c739a5dfc5d54bfe748463cad69c62672376e5223d320fd5ea06e23e5ef26

Identifiers

AWSSDK.CognitoIdentityProvider.dll

Description:

AWSSDK.CognitoIdentityProvider

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Cognito Identity Provider. You can create a user pool in Amazon Cognito Identity to manage directories and users. You can authenticate a user to obtain tokens related to user identity and access policies. This API reference provides information about user pools in Amazon Cognito Identity, which is a new capability that is available as a beta.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.CognitoIdentityProvider.dll
MD5: e6a430a806b6c5c99263721a969311bb
SHA1: 0b91d48fdefd6bff4ba75f8c6192f1313d55e04c
SHA256:97c75eccc1a35cbf04492edf7e81e341611628e64c0747679764fd8c7b04484d

Identifiers

AWSSDK.Core.dll

Description:

AWSSDK.Core

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Core Runtime

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Core.dll
MD5: 467e76b9d9380d31edfeaae7ad995e12
SHA1: 8e71b48688d4ef0cd167702ca1c76ed557879520
SHA256:cd39c7453bdb706e6389daa8b08f745f12c198f71184de0fe7d3347cd6f555ec

Identifiers

AWSSDK.Core.dll

Description:

AWSSDK.Core

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Core Runtime

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\AWSSDK.Core.dll
MD5: 9629a129a165ca4020f88a5d0a1986d2
SHA1: 40ccf9fccf91aff983d87474df954ca0126a8332
SHA256:6c8ff7b2d3ec3b0e4e573ffe84b8a8a617b9157b9e9e3d55870967c205e9b286

Identifiers

AWSSDK.Extensions.NETCore.Setup.dll

Description:

AWSSDK.Extensions.NETCore.Setup

Amazon Web Services SDK for .NET extensions for .NET Core setup

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dll
MD5: 16c4d2168143c1802bd5f0e22a6a6e77
SHA1: 4f2dd534473e60396793e3daf8e7d2c78c9749a7
SHA256:de842a88c3aef72b4b5c916dee93f367226d5587d8ea929ccfb083919395ba6b

Identifiers

AWSSDK.Extensions.NETCore.Setup.dll

Description:

AWSSDK.Extensions.NETCore.Setup

Amazon Web Services SDK for .NET extensions for .NET Core setup

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.Extensions.NETCore.Setup.dll
MD5: ba4e1f512dc604aa5acb619e21a85e33
SHA1: 1559609f307e078da77a8707475ce211700f78bd
SHA256:0faedb59d138a58703944a4a2fc7455d0b4b23cbe53c5087e1fe634b6757a8c1

Identifiers

AWSSDK.Extensions.NETCore.Setup:3.7.2

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

AWSSDK.KeyManagementService.dll

Description:

AWSSDK.KeyManagementService

The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Key Management Service. AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.KeyManagementService.dll
MD5: a1b05ac0406fb1a3ca086d90d74f6e99
SHA1: e1bebc738e77afd79877f9a014b1d3f673aa91bb
SHA256:64f4688ffddcd5f3bb01b54ba93b053c2c4d8e5075ab268ef89b3b7f7b5ef888

Identifiers

AWSSDK.Kinesis.dll

Description:

AWSSDK.Kinesis

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Kinesis. Amazon Kinesis is a fully managed, cloud-based service for real-time processing of large, distributed data streams.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Kinesis.dll
MD5: 55f9c9dfc45d0c99d00df1fdb8906dba
SHA1: d9bec436c205666bafd3a83c564f44f1842c910d
SHA256:1b9bda747c0f5649eb9f6f44fba0acd7b849e726c673b0cb38d5ee0bc7f78437

Identifiers

AWSSDK.Lambda.dll

Description:

AWSSDK.Lambda

The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Lambda. AWS Lambda is a compute service that runs your code in response to events and automatically manages the compute resources for you, making it easy to build applications that respond quickly to new information.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.Lambda.dll
MD5: 565fb50b03e9ced659b44217eaf7f21d
SHA1: b82678f45e7dcfef8c05d9a2bc635c29b83d9916
SHA256:9475044bf55b6aaa7d3da7e817ef0f119322d0633169f10040421ae40c9742b0

Identifiers

AWSSDK.Lambda.dll

Description:

AWSSDK.Lambda

The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Lambda. AWS Lambda is a compute service that runs your code in response to events and automatically manages the compute resources for you, making it easy to build applications that respond quickly to new information.

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.Lambda.dll
MD5: 8e9fdd824d660ddf700c1616b4211ecb
SHA1: f68793ff15c1451a6fa7ae9866d9e41eea9daa95
SHA256:57010c8613942e972f5443b8247db47ef68239404626ec8354ac4630f9ea65fc

Identifiers

AWSSDK.RDS.dll

Description:

AWSSDK.RDS

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Relational Database Service. Amazon Relational Database Service (Amazon RDS) is a web service that makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while managing time-consuming database management tasks, freeing you up to focus on your applications and business.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.RDS.dll
MD5: 39b016f734436e0ce6e04f8deec3d91e
SHA1: f6a1c5b907fdfaa29114f5e2ee470cfe42c9968b
SHA256:3bed76b016236dca68609aa36434f7f81ec3d402b0408347dc81dadcafb7b839

Identifiers

AWSSDK.RDS.dll

Description:

AWSSDK.RDS

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Relational Database Service. Amazon Relational Database Service (Amazon RDS) is a web service that makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while managing time-consuming database management tasks, freeing you up to focus on your applications and business.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\AWSSDK.RDS.dll
MD5: fdeef7a8653996d212707d196da0297c
SHA1: 8d32a9b416563cfba1d90f49b7eb3d4d060f978d
SHA256:a1e0ead59da7a9400545f6f2a7dfcfb9c94837cd73269692be2d0c11b1dbb2a1

Identifiers

AWSSDK.S3.dll

Description:

AWSSDK.S3

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Storage Service. Amazon Simple Storage Service (Amazon S3), provides developers and IT teams with secure, durable, highly-scalable object storage.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.S3.dll
MD5: e353b098e61f99dc5ad9deb64979b086
SHA1: a8a5a8311baad216c4939b80ed1a4b0dee39221b
SHA256:5eba0cd9f4aa536ac36fab2cf8e1c3824f80be4e51ff863ec55f56a235c664a1

Identifiers

AWSSDK.SQS.dll

Description:

AWSSDK.SQS

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Queue Service. Amazon Simple Queue Service (SQS) is a fast, reliable, scalable, fully managed message queuing service. SQS makes it simple and cost-effective to decouple the components of a cloud application.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SQS.dll
MD5: b64058f765f446099bfafdd7de480b0b
SHA1: 074f840c244bab2a2de9679c2c536bfd8b180ceb
SHA256:a54f151d8eb606fd9d02e62489c76fbf0c7fb620268822f5ddb3989b948f31e4

Identifiers

AWSSDK.SecurityToken.dll

Description:

AWSSDK.SecurityToken

The Amazon Web Services SDK for .NET (.NET Core 3.1) - AWS Security Token Service. The AWS Security Token Service (AWS STS) enables you to provide trusted users with temporary credentials that provide controlled access to your AWS resources.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SecurityToken.dll
MD5: cc71468541154b15038c3cac1bbb3f23
SHA1: d86b9f4eb2d14659d48f55169df90d1ef963d129
SHA256:fe6eaecdd72a6280bb72db3a17dc63748d32b1114254cac74c3c44da0d8cc25b

Identifiers

AWSSDK.SimpleNotificationService.dll

Description:

AWSSDK.SimpleNotificationService

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Notification Service. Amazon Simple Notification Service (Amazon SNS) is a fast, flexible, fully managed push messaging service. Amazon SNS makes it simple and cost-effective to push notifications to Apple, Google, Fire OS, and Windows devices, as well as Android devices in China with Baidu Cloud Push.  You can also use SNS to push notifications to internet connected smart devices, as well as other distributed services.

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SimpleNotificationService.dll
MD5: 2a0aea99f4086fc30ca14f26c189b6fd
SHA1: d01c20985248b70fbef818dbbfbfd9a6836f3c30
SHA256:e5436663f4135f650f7a4663fac7626570c2f9be76f7a29474b8a4851705030a

Identifiers

AWSSDK.SimpleSystemsManagement.dll

Description:

AWSSDK.SimpleSystemsManagement

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Systems Manager (SSM). Amazon EC2 Simple Systems Manager (SSM) enables you to manage a number of administrative and configuration tasks on your instances.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dll
MD5: ef1896a30bd410629a4c3796000d4a24
SHA1: 47987aaf60eef3520039aba68b84cc7f89dc1f6b
SHA256:04cb00a3c8aaeb5184a2963cc622a6a8a349d5d68111c6c71ee3cdc0c7f11b72

Identifiers

AWSSDK.SimpleSystemsManagement.dll

Description:

AWSSDK.SimpleSystemsManagement

The Amazon Web Services SDK for .NET (.NET Core 3.1) - Amazon Simple Systems Manager (SSM). Amazon EC2 Simple Systems Manager (SSM) enables you to manage a number of administrative and configuration tasks on your instances.

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\AWSSDK.SimpleSystemsManagement.dll
MD5: 26fd7bd79d315ed267656b83e1974be2
SHA1: c3a40d060ed4f71e3877e16190c483705ff471cc
SHA256:154cc873aa5a53b93a94cfd5cd1f7f594401e26a1d857cd6601ab30dd410c6ec

Identifiers

AcceptTermsCommunicationService.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\communication\termsAndConditions\AcceptTermsCommunicationService.js
MD5: a07c50c661f8ec44a741f3b6bdf1b1c9
SHA1: 326e4e020e532baaaca55c3cc6c3f933fff5911f
SHA256:1079fbd329a3e2c60efd05c503edb295e4451d8fb4a689ff7e082e74009c9f6c

Identifiers

  • None

AcceptTermsSchema.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\AcceptTermsSchema.js
MD5: 1fbd49f0d65ce1e43de0ea0e8982f298
SHA1: d7f09bd15e54c6f44eb9112252c2f9bd69100263
SHA256:96e7ab359419a3ed098532611f57ba72988b4a18bb1cec13d65e549e15d22dee

Identifiers

  • None

AcceptedTermsAndConditionsListener.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\event\AcceptedTermsAndConditionsListener.js
MD5: 7433c44936eed5f08c50155837bfab6c
SHA1: 43af96cf56eb7957f1b7e1283bcf08cf661d497d
SHA256:521e873e6f7b541b1aea4488469f226cc2a373c487f887c9fc11096af43dc5de

Identifiers

  • None

AllowedProcessMethod.js

File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\models\AllowedProcessMethod.js
MD5: c3c7c444b19697fd17c6ac0778027d71
SHA1: 1c06e5c77c4a68b9aa53d5783d30ed628d1104a9
SHA256:6914165c03c84a93d5e2d8c6f80a1c640be0d885f3366b972b44c78f9e3b9c8b

Identifiers

  • None

Amazon.AspNetCore.DataProtection.SSM.dll

Description:

Amazon.AspNetCore.DataProtection.SSM

AWS Systems Manager ASP.NET Core Data Protection Provider library allows you to use AWS Systems Manager's Parameter Store to store keys generated by ASP.NET's Data Protection API.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.AspNetCore.DataProtection.SSM.dll
MD5: c68f7ef58793633aca20d5537f8556b6
SHA1: c6aa5cd3d91a92375da190b38531c610577ace5e
SHA256:67d29bc3abd30afc2b17f9d1f1c1f655e833983c766403e4ecd4795449cf7b69

Identifiers

Amazon.Lambda.APIGatewayEvents.dll

Description:

Amazon.Lambda.APIGatewayEvents

Lambda event interfaces for API Gateway event source.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.APIGatewayEvents.dll
MD5: b6ca3641f0c25773bac593a06a0fb9e3
SHA1: 95a763997227a26c7220d5ce12590f9c91cc2161
SHA256:3c570cbb4ae78b5882cbe5472fcc3c97c59e59d367d73d44908102df4671b234

Identifiers

Amazon.Lambda.ApplicationLoadBalancerEvents.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.ApplicationLoadBalancerEvents.dll
MD5: ae75d9f69d0372ed9f5670b7dda6d289
SHA1: 577796cab594dc7e43ce3f7a0c3002d9017cf789
SHA256:92d056aee57a68fb73e5d4844d6b8a31b5b357a348ec8410530efe0f8925621f

Identifiers

Amazon.Lambda.AspNetCoreServer.dll

Description:

Amazon.Lambda.AspNetCoreServer

Amazon.Lambda.AspNetCoreServer makes it easy to run ASP.NET Core Web API applications as AWS Lambda functions.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.AspNetCoreServer.dll
MD5: 1a98e64bd09cd446ffdf624e5a108e78
SHA1: e69b02e55705f32e276c83d025532c9464417518
SHA256:844a98b87b1f9f21591a939f01bb0bd19a0d455c663c7266b0b9050f0994c66d

Identifiers

Amazon.Lambda.AspNetCoreServer:6.1.0

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

Amazon.Lambda.CloudWatchEvents.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.CloudWatchEvents.dll
MD5: 95bcaf057baddd5713bcc10d17a73d5d
SHA1: bed28cd81de9b98d42c2bdf68a69aab61c5c26f7
SHA256:5f79fb4e79167c31d73b9bf1cff5f1b3241f9162e1aa889a76cccbe951f22b77

Identifiers

Amazon.Lambda.Core.dll

Description:

Amazon.Lambda.Core

Core interfaces for Lambda.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Core.dll
MD5: e3ff649709a36002a8caeba1c2b6a63c
SHA1: 8a0d532bd5dd292dd8b5572c81a0af48a30cd5ce
SHA256:d3fd1d761d03288299dfb5bc5fbb9650c360e815176828704ed683d056ffa249

Identifiers

Amazon.Lambda.Core:2.1.0

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj

Identifiers

Amazon.Lambda.DynamoDBEvents:2.0.0

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj

Identifiers

Amazon.Lambda.KinesisAnalyticsEvents.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.KinesisAnalyticsEvents.dll
MD5: 8f07da2c44d07e00ffd18617185a44a6
SHA1: a3ee958d7b47e88ab6ae0574f37e6fa6e953999a
SHA256:239691d2dfbae3d58ea3c9b8c2f5b396b4f25651c36daa79099a9cf6e8c9c427

Identifiers

Amazon.Lambda.KinesisFirehoseEvents.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.KinesisFirehoseEvents.dll
MD5: d82690e43781e417b29ff66f8b5ef4d0
SHA1: 4c1f6bba718b21df0b04b4bd67cbbc83dd2d2221
SHA256:179e5a4529400afdc968f507b8431d5231517a83152a3c0ad4eaf90b2a9cfc54

Identifiers

Amazon.Lambda.LexEvents.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.LexEvents.dll
MD5: b89322ea82ad62547d97a46dd9dc14b6
SHA1: db339961be56761b0e8a506e3c14fcd50b9e1e54
SHA256:96936afa0b68936a44785528b270f1e7f65967af7707d61d144fccf91cf6f35a

Identifiers

Amazon.Lambda.Logging.AspNetCore.dll

Description:

Amazon.Lambda.Logging.AspNetCore

ASP.NET Core logging support for Lambda.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Logging.AspNetCore.dll
MD5: 9482935b3e88a8679c51b76bad324279
SHA1: 680ec56a97395d0c0f61bd550e0d2df20621e7c6
SHA256:770e5dfc23757a239061d5748dd0a2af820160cb84d793766cc2cabb6f4eeaf4

Identifiers

Amazon.Lambda.S3Events.dll

Description:

Amazon.Lambda.S3Events

Lambda event interfaces for S3 event source.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.S3Events.dll
MD5: 5ef1a162e3b5f0c31e8d4580f4624790
SHA1: 688edb3da7fbf8812e6fd5a819c52eb8fdb5bb49
SHA256:8271ee68778721ea61b439e5440a81a2863edfabdcb2c9c1778a9b8b86969fdd

Identifiers

Amazon.Lambda.Serialization.SystemTextJson.dll

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Amazon.Lambda.Serialization.SystemTextJson.dll
MD5: b77fcbcec7c650a0c1713ea9a1d09de2
SHA1: 0cd156da025e57bdd625f1df7f817cb52007a372
SHA256:a8ff5ed7ce213b6741500a3337e474a250daebd21146146f81f2ebdf31ce38e8

Identifiers

Amazon.Lambda.Serialization.SystemTextJson:2.1.0

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj

Identifiers

Amazon.Lambda.TestUtilities.dll

Description:

Amazon.Lambda.TestUtilties includes stub implementations of interfaces defined in Amazon.Lambda.Core and helper methods.

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Amazon.Lambda.TestUtilities.dll
MD5: 826762c8a91a919ea831875b0d7d78ad
SHA1: f5e073535f9336b543f8a9c2c6bc16e3fa67991d
SHA256:d093bbb3ffc49a56a8fa4dce76ec8b7984b609d73a17fab5d5f5c573f0efa9c9

Identifiers

Amazon.Lambda.TestUtilities:2.0.0

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj

Identifiers

AutoMapper.Extensions.Microsoft.DependencyInjection.dll

Description:

AutoMapper.Extensions.Microsoft.DependencyInjection

AutoMapper extensions for ASP.NET Core

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AutoMapper.Extensions.Microsoft.DependencyInjection.dll
MD5: bf5a14d1fdeba396f8d80bf66d217820
SHA1: 8f6b9999990441713357167e68401e9464b8b09b
SHA256:89637796f62f8c6ef5a4d01e869d7cf79ed5c50316b1e6af28e6d84952c77ea8

Identifiers

AutoMapper.dll

Description:

AutoMapper

A convention-based object-object mapper.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AutoMapper.dll
MD5: 4ae1c613bb4d98881e5ecfc5dd74471e
SHA1: 11e1f342709437e30fe8a66284eb11360dcaa889
SHA256:8890c79488484a283961028752a4f4b25f04a33222d838990225f99376748085

Identifiers

AwsParameterStore.Microsoft.Extensions.Configuration.dll

Description:

AwsParameterStore.Microsoft.Extensions.Configuration

AWS Systems Manager Parameter Store configuration provider implementation for Microsoft.Extensions.Configuration.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\AwsParameterStore.Microsoft.Extensions.Configuration.dll
MD5: 6cff4cd5f4718297b37aa5e5bdc12d3b
SHA1: c45342ce39b8ea74491f13ab6382a1b479a7ad60
SHA256:903a0610bba31e40d1031e08d2a51354754f06c542678e587fbedab222def010

Identifiers

BaseCommunicationService.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\communication\BaseCommunicationService.js
MD5: d52f352cbbd12b515f31dd4346de6462
SHA1: 3c5d0be67b93cd8e5076bd29f04e1b34e0b739e0
SHA256:12662a257feafc6a5c76f629587035fe0940eb2e8d8ee3fb56b11b7ba27c18b0

Identifiers

  • None

BaseModel.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\BaseModel.js
MD5: 91e078c5c57c3fe8d1c7b33358507870
SHA1: f598d799ed6fa2ee566ad80733a6a900b7363e81
SHA256:86f5faa8904900bad3057a68166b8cbd2ebeb66a53262ae429de1369368d1da2

Identifiers

  • None

BaseModel.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\BaseModel.js
MD5: 63c25b56380823c470516a66b68096e1
SHA1: d750d4164c3d083ad9cc1065f91f4e69a27077b3
SHA256:5639749cdfa66ddace4fecd7a45cf16476bcb80c52095f87657f91039e142e99

Identifiers

  • None

Castle.Core.dll

Description:

Castle Core

Castle Core, including DynamicProxy, Logging Abstractions and DictionaryAdapter

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Castle.Core.dll
MD5: e22bfef97c2f4eb2f188c5fedde63380
SHA1: 97a897886d72852edefc43bba31070a2b69183d1
SHA256:be886e2e643aeff56bffa81c008050709971de8e20387408ae508630a05bcd79

Identifiers

Castle.Core.dll

Description:

Castle Core

Castle Core, including DynamicProxy, Logging Abstractions and DictionaryAdapter

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Castle.Core.dll
MD5: c61b61fdcb770f341eb7a903fc9684a9
SHA1: 03b6586f30739006f6ef3a4645205b91c1544b8d
SHA256:7f34412cf227e622eff0d0a687c1f08c3297b8df8435780f02b99e60da842c80

Identifiers

Category.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\Category.js
MD5: e2aee4f618589acfbb3e4682aa6c4d30
SHA1: 67dc834f7381d3449da3d621d5969479afcb47e5
SHA256:5386fed9b419295d79d14458d2b15175ca528862917d2595ad1df2309cfef206

Identifiers

  • None

Category.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\Category.js
MD5: 55c05a52f576b5fd4b5a0bdf0d3ac40b
SHA1: 32abbbac5a77bce8e4a1d5eafaa450f409cbb1fe
SHA256:e4e6c124804a5997bce4a450fb7b98bbfae892c3d57c3ca93a70dc07d3f93287

Identifiers

  • None

CommonService.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\services\CommonService.js
MD5: aaff1849e222c71eee20175df71fb4c5
SHA1: 410a63e1e29067055f74ba60b6291413336db9dc
SHA256:7548eec3983f1a2680da6148559512c5f12eaff9d6f98fc90ca5715c585db494

Identifiers

  • None

CommonUtil.js

File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\utils\CommonUtil.js
MD5: 812e1bec8f406aa190317b58e9f68b16
SHA1: a18a0d343924e645e7c1912dafae25aa38c23664
SHA256:e3444f0a13aa95ecc01fd632ef27ce254b7ab09b85f9a3fa2dc65b6478e516be

Identifiers

  • None

CommonUtility.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\utils\CommonUtility.js
MD5: 871a43fcd083546f2038892bbc13921b
SHA1: 699f713f857d754ff869faf59f5943329b2df591
SHA256:3d2027f6af0c50c935b0702e57db7caba2c32f03055acdecdce4aefa0c1d1dec

Identifiers

  • None

CommonUtility.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\utils\CommonUtility.js
MD5: c4badce96e253b032b8f7a4c0912e2eb
SHA1: 5a25b813f1af093c15609a1377e15f53606b8c40
SHA256:62d5597e8c9811cebc7941f2225a578eb379cab139c6de718cabdf310f26ae75

Identifiers

  • None

CommonValidationMessages.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\CommonValidationMessages.js
MD5: a931369c0ec6c4ae47f9753f75d50c0f
SHA1: d0eb6e27a2792a3c073186d6ea409306d4494bb6
SHA256:4777a1eb8f70a40f69bc8c8fbbdc37117a05f174fd056351630db5c0deeee012

Identifiers

  • None

CommonValidationMessages.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\messages\CommonValidationMessages.js
MD5: a1861fdbeb2d5db80a67f985377a2be9
SHA1: 669e2dde1d41121d77f477a15c3abebc3b56b2b2
SHA256:ce0c2e74e0f1c2c44492e6acc1649137c222f856b0d11f9cc36211061c4ea319

Identifiers

  • None

ConfigurerType.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\ConfigurerType.js
MD5: 0edae756c6c7f8ae34ed0756873f16b5
SHA1: d25884940d7c49531efa243e3f4ac2d57ed6d545
SHA256:48541fb542e9e3f1d1a9e6d1a66e4116d8a79b0d5a50915d3dc7c8793a7bf6dc

Identifiers

  • None

CountriesSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\CountriesSwagger.js
MD5: 286daaa08f32589758bfadd2c3f366b7
SHA1: f08354e05636afb4b8eb2083c62ee73fa90b4cde
SHA256:7b138a14f0336956242753c2ca0851f5b0afeab4c40e2235336f507d52515383

Identifiers

  • None

CustomErrors.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\exceptions\CustomErrors.js
MD5: 9e1e96f05b175a9846b8afed2eac1d30
SHA1: 1f78d06ad968a0fb625286d9d72d961bc104af76
SHA256:66ef92f44ff85866bfef3041fc0fe6a3081de6b56005bb9d36888e0b8045a5c5

Identifiers

  • None

CustomErrors.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\exceptions\CustomErrors.js
MD5: b47d6fdf8bb3d16db299f3333b805734
SHA1: 3390566c7e89cc7cc17d9d2a5ab7de5f046355ba
SHA256:153adab223ec354945b62ed9c932ad23611b189366d04b26450c22b69c6dd89e

Identifiers

  • None

CustomQueryBuilder.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\CustomQueryBuilder.js
MD5: e6cae74d6995ff88dc38a98c6b4c4582
SHA1: 8beb3aa88edb40d7fe8aebfc7aa743a6753574ee
SHA256:5a53cdae0cd1fff81c63b104eb586fceb5d6d95ba51b19ac9f402c5eee4db9e3

Identifiers

  • None

CustomerEventHandler.js

File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\CustomerEventHandler.js
MD5: 25f466c587f84acd23bf402107bdeebc
SHA1: ad982c92d676a558ec016ac8913c393240ce105b
SHA256:4aeff4a701b7c070f5b67970feefe97da9cb0b2f2a66f0a5e685b712cfca9ec9

Identifiers

  • None

CustomerEvents.js

File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\constants\CustomerEvents.js
MD5: 227b126f23af3eb4b6ba2142579d6e8f
SHA1: 4b26db921332d64f94a6926e27c2501462641885
SHA256:7750da0ad18ae4c8bc9b5817cfd2c5481b3d2c954abd1f691dac0a4b643d2244

Identifiers

  • None

CustomerFlexFieldValueSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\CustomerFlexFieldValueSwagger.js
MD5: c544fae87a3b5210db1baf9180f667e0
SHA1: a87763a11eaa3f5fb4d01bda55c4a7683cc83a50
SHA256:fe4badbbb5dff1a9aacf570f79072ff4c7fa5c35c5d8f7ea7c9cc53a25433127

Identifiers

  • None

CustomerRepository.js

File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\repository\CustomerRepository.js
MD5: 95b6f0268803096c6e121e5137175bfa
SHA1: d842794b8f56661d1982a8cda2fc5efc2d8ed9c1
SHA256:5f48a2172b7492b284d0df264ccd56daeb3e11c5c5415cdebaea466c540a0cd4

Identifiers

  • None

CustomerRepository.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\CustomerRepository.js
MD5: 9060fa7372f737e2071849509f2cad55
SHA1: e65175b33b994cb0f5bf1727ff3ccfd2a9103b2d
SHA256:6d5a9b561313aa1f7298c37eb356ffee927a947b9432255424b1e31d07406472

Identifiers

  • None

Customers.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\Customers.js
MD5: 13f10a4f2ceeea0641d81ec468d583ce
SHA1: 31472128b95a7cd812554501ccc1c67eb7eec5d0
SHA256:ea31b6b990bf8293a0aed0d845da37627d9fe37994e3265b3c7522df8a9b57b5

Identifiers

  • None

DefaultMerchantTax.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\model\DefaultMerchantTax.js
MD5: 61fdc11ad35e5ef16b1106c454938d97
SHA1: e0b55d4b6a5c56c8eb697bb1fcfc880414b51afa
SHA256:d2f8f7c98ee2269b32ba443898fa290c7689a8f0bea382659f9beea9e75dc9fb

Identifiers

  • None

DefaultMerchantTaxAssembler.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\assembler\DefaultMerchantTaxAssembler.js
MD5: de7059c43d903be5626cf5ddb413fd1a
SHA1: 82dde8a70d05e89c06589762ae2684284c15840e
SHA256:911bf877e148538a4e39fa849c6e890537c603bc43dc4eabd2601622090d6679

Identifiers

  • None

DefaultMerchantTaxController.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\controllers\DefaultMerchantTaxController.js
MD5: eb8cee738f6c2f362bda28e471c4c0c8
SHA1: 19cc1f133d2d783ab90499453eb09d9dac0aacdc
SHA256:d2b210d05229dea633e7aec721491d2b0cbcdfe84ee1534e1a81a4c90823e306

Identifiers

  • None

DefaultMerchantTaxRepository.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\repositories\DefaultMerchantTaxRepository.js
MD5: bad88fb31793fa8d7d0c0b0e1731845e
SHA1: 6da140404eb16934a855dda4af89679dd86785b3
SHA256:eb5a3acf8223bc311f014f91c7c33e56b519d99777177464de201f309606261b

Identifiers

  • None

DefaultMerchantTaxSchema.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\schemas\DefaultMerchantTaxSchema.js
MD5: 772d80c905326702dc2fcb8744d7b225
SHA1: d524cb7e459ed9b0cf75c37d50dcddac7a92a4f7
SHA256:e0c6c5fa85b2ef5dcd6c43d349978bfcc73cf2d1a4d67422655d0462859401b6

Identifiers

  • None

DefaultMerchantTaxServices.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\services\DefaultMerchantTaxServices.js
MD5: be86c81d73e15ab9d8c98054ec06a1fc
SHA1: 96d8f604f15be06daaba0906c861b9280aca5e67
SHA256:65da30fa0dfce4a89ec4be5dbe686298ae3363c81ff527ba81199fecb851fc04

Identifiers

  • None

DefaultMerchantTaxSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\DefaultMerchantTaxSwagger.js
MD5: 6ac199cb17833bd61b4fc1b1c0bfd51f
SHA1: a9dd1d91f3e93dbca259f9dc148577943161be0d
SHA256:764a41616c2726fe2285ff21d11ef550f9fbed90d4b4d87c10b42e73525583a9

Identifiers

  • None

EntityType.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\EntityType.js
MD5: a18e3c8255bbe952e68ebb2c1e30e97e
SHA1: ef274ba6882f7d136acd6d814aa98d2e182d9849
SHA256:10b3ee14891d795899621abce05fd3cb5547be5943f2a72a035704f53ba5042b

Identifiers

  • None

EventType.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\commons\constants\EventType.js
MD5: 1da46f253535d16399db4f9dfd1f5ca6
SHA1: 71abc8ba59269b6471b96c70d88b4e5e98d1877d
SHA256:408526009ffce56fe6e5e4f98ba2852f298341ccd25add8f2ca23565681201b6

Identifiers

  • None

EventType.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\EventType.js
MD5: 0675fe10458e96b7ab515196f75307f0
SHA1: f5397a106e4f7938f360595f7dd0b0cd1ffee5f3
SHA256:9d2d2f568a543cb024217ad3c08b6e388db0ae4d8426921c61fe2a497da61554

Identifiers

  • None

ExceptionMapper.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\exceptions\ExceptionMapper.js
MD5: cab538b815c78f845333e94fade99730
SHA1: 00dc0cd35f0ce8964b2f9bb36b1baa90b741f9dc
SHA256:f386066066c9158ef95a9fe2c600d3d015ec24d04d646def868b9e877e960062

Identifiers

  • None

ExceptionMapper.js

File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\exceptions\ExceptionMapper.js
MD5: a2764c476099900847c0bd3c911f93c1
SHA1: 7dcde25990f4e0b09193864d93b5c088814ec88b
SHA256:4814b59ca493f8ef1acb9f5396f8e350d2365e651d90d3987ba857b7b8856cdd

Identifiers

  • None

Fee.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\model\Fee.js
MD5: b228eba779de6ceda3a77666ff2d9f81
SHA1: 1bea86e35cb623814322ea9e6278f9deefbf5fa5
SHA256:741314377f421f23a8ab28f540ddf6937bb8c505001efa184b7885fe5cb5c7e3

Identifiers

  • None

FeeAssembler.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\assembler\FeeAssembler.js
MD5: 12f71cc11db4780ff284889195ef1129
SHA1: 00eafdd1cdf12f80c4a39c1b4c2344a71af61e92
SHA256:264ee8713f99a22276c9c979a764c304da5ffcd66725ab86fcf275fa015384e0

Identifiers

  • None

FeeConfigurationValidationMessage.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\FeeConfigurationValidationMessage.js
MD5: cdac38ccadc4be48972cb95a5950c4f6
SHA1: b9e8d4e1de1de1dcc1cad8fa841a0eee93e3a0f6
SHA256:9ab65bdeff06f9275e82f481226821940f936734d3de57f4e0ed34c1c9792387

Identifiers

  • None

FeeController.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\controllers\FeeController.js
MD5: 601fd840b59300d8c7530cdb108dd10a
SHA1: cd46ff73e0b24ba274ad7b8e0024ba6b6c406761
SHA256:9493ac818cca533e41d48e5983387de66bcae123e5e7e4419ebe96c8afb58fdb

Identifiers

  • None

FeeRepository.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\repositories\FeeRepository.js
MD5: 81f3908a7e585cca5edc39f1de9d63be
SHA1: 68f9b50209337a9780381201f2d80b21f9b0f9f6
SHA256:3546af43388d7056afa4bfcaa9489d57cb304770c3796514825e92f3f019e1fa

Identifiers

  • None

FeeSchema.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\schemas\FeeSchema.js
MD5: 253e5ed198fc714c5d2eba8432d87add
SHA1: a0385fa3c0782d953134d6398b41a7dbc7427ce8
SHA256:9ce62f335bec5cbe6c0841a86bfbbd301150037a33e5bf0ce38007dbdbd47b24

Identifiers

  • None

FeeServices.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\services\FeeServices.js
MD5: 5fbb06a2a82ab098914111a96fd40d88
SHA1: 27ed2bd00054951842d0813e954785867c531784
SHA256:85eb5a6e27abb7d83b45e0de4e27f05cca5b6b895b5ae862b310726ec98d8d9a

Identifiers

  • None

FeeSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FeeSwagger.js
MD5: 26c56bf32dc0fd89b6fa748411028d1d
SHA1: ed745ca1d050b417c031f161eb5518ceafa170bc
SHA256:eff02f0480fa7aed7c84d07939439ee7d5bb94fe4b0b5fe029cb9b38f42a18e9

Identifiers

  • None

FeeType.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\FeeType.js
MD5: 59630d00231003de30ddf13f704e87ff
SHA1: 9d4b1868b5c798859bb614e8aab66a9eec0b5e96
SHA256:68f8a1b2e34d1689b5b15178716b92206f4b4edc244dfa71946b8f53ffe6c72e

Identifiers

  • None

FieldValidation.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\utils\FieldValidation.js
MD5: c09a4afca4e35d1ed802add9fb204fe6
SHA1: c43a53fab42d1cefff70199159b6695f4f56b975
SHA256:9152dc763ace2f906e223607e08f0f5936a6c86ab53e41e43dd7dac78ebb10ab

Identifiers

  • None

FlexFieldValueSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FlexFieldValueSwagger.js
MD5: a6abe6abd1a2d55867fdbdc70c00f0b0
SHA1: 04c51b00e4892186943fb96c199c76016ff6db26
SHA256:0e98d71ab7426ef1910d0027df47dc1e3429c336167bf548ca80d4f75fba2bea

Identifiers

  • None

FlexFields.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\FlexFields.js
MD5: bc1f8018e2a4468b5a4a63c0cf0ea6c1
SHA1: 47492e4a1e9a5220b703269b5bae3168052722ea
SHA256:c9a4e5a199751191d6c868e0592858a47da8af305bdbbc1c3fd9d43d429df115

Identifiers

  • None

FluentValidation.AspNetCore.dll

Description:

FluentValidation.AspNetCore

AspNetCore integration for FluentValidation

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.AspNetCore.dll
MD5: 8e216637cc046d978f094941eb698c40
SHA1: 5b6a2071b4055f93be71fc42e55ec60b0ad5882b
SHA256:50fef80fb821c6d0b221aab984b4e0b0ced37b4ad2e21b8eb4459de4d5fca349

Identifiers

FluentValidation.AspNetCore:11.0.0

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

FluentValidation.DependencyInjectionExtensions.dll

Description:

FluentValidation.DependencyInjectionExtensions

Dependency injection extensions for FluentValidation

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.DependencyInjectionExtensions.dll
MD5: 0033eee7f05c774e2271b3b848d426cd
SHA1: cf79f75aaf9db05c41f215db02964b18874e367c
SHA256:3168b9f878f6c92775d9c57d2b3eea4c72107b72541c424ac859672fd80d5608

Identifiers

FluentValidation.dll

Description:

FluentValidation

A validation library for .NET that uses a fluent interface to construct strongly-typed validation rules.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\FluentValidation.dll
MD5: b2b8f1e70976a3542d7d2c5a7357b34e
SHA1: b700e72f97f0c8babfc8c38bc22bc2cd00b85567
SHA256:668f03932c1e61d41fcf7d2f4b591cd2d08c6bdd83aec8c74e2309780125302f

Identifiers

Frequency.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\Frequency.js
MD5: 91c5fe62a7d7f70a1a1a08865d81c050
SHA1: a251d5d2aa4bb68cf17d83fe70d48bb26273b1e8
SHA256:5170a7bf52e17f18ab8f3469be28031b19397d086b626db2da584d1b71cdd082

Identifiers

  • None

Hashids.net.dll

Description:

Hashids.net

Generate YouTube-like hashes from one or many numbers. Use hashids when you do not want to expose your database ids to the user.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Hashids.net.dll
MD5: 4ee98fe3c85b8f3d4ddcf8d0552340d7
SHA1: 873d03c01e43ab3d2fcb003a9e0325c612e5f0de
SHA256:c9bec0ef0b33f92bfe905e4d2e32142a1f894409e2fce01262ea443049f7fb42

Identifiers

Humanizer.dll

Description:

Humanizer

A micro-framework that turns your normal strings, type names, enum fields, date fields ETC into a human friendly format

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Humanizer.dll
MD5: b23ec3bf471a12c288f2a46b428bd013
SHA1: 766c5bf33247f5d399f410873f4640c35fbc885e
SHA256:15e988ab3e8d84900ae90549eb399aac452d55edf0109e06fa1a9b227ddfd4c4

Identifiers

InternalCommunicationService.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\services\InternalCommunicationService.js
MD5: 04163d424efa4a16e60fe6496a7ab1d9
SHA1: 5690e46fc87c14f8592ae072fe04964f8254b486
SHA256:fad457bad7131d2f1b5754c94c7931bf5a97b218b3a3a529c317876e7558ffc8

Identifiers

  • None

Lumigo.DotNET.Instrumentation.dll

Description:

Lumigo.DotNET.Instrumentation

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Instrumentation.dll
MD5: e4d82c66569f9018e8eb35f07a0853b9
SHA1: 06f2aee4ed03a9563fdf119cba3e371969a62b8b
SHA256:a0b49a18bcf417aeaeb2defd55858916a36f6e20c638901cacc734c8e2dee67c

Identifiers

Lumigo.DotNET.Parser.dll

Description:

Lumigo.DotNET.Parser

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Parser.dll
MD5: 8f73799c54f37cfe9242d24a8cadb19e
SHA1: 4b678ea57bb25a3ab189116083d5bb8ab6ec0ddc
SHA256:953362896d4482d14e3e3f1c16f9e8804a07be70001057b6fb1995f9b866be80

Identifiers

Lumigo.DotNET.Utilities.dll

Description:

Lumigo.DotNET.Utilities

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.Utilities.dll
MD5: 57723ebe4b524e97b1a8eef9b434f7ac
SHA1: 5f5c55f891b979890f606721a65fb020a516ba3b
SHA256:ec83d49a5d94ef4e3bbae004b57fd22e19a534b3b0612a397970b86f29279955

Identifiers

Lumigo.DotNET.dll

Description:

Lumigo.DotNET

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Lumigo.DotNET.dll
MD5: 8dd28f78db0d271e52f6cb3995d610a4
SHA1: 7ca292cce2dd9301347389ba601d36b42f4b4557
SHA256:d66a787d2600af189e4ec512afbaf39078cebbabdf619427b309bcc36f3ec106

Identifiers

MSTest.TestAdapter:1.3.2

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj

Identifiers

MSTest.TestAdapter:2.1.0

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj

Identifiers

MSTest.TestFramework:1.3.2

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj

Identifiers

MSTest.TestFramework:2.1.0

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj

Identifiers

Masters.API.Tests.csproj

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj
MD5: 8bc7f8c76f627264598f4168db357c72
SHA1: 165ba5917f7578355bceadf89183c2c50b10d383
SHA256:7002d1e2304a1309b52cb9c2c257f6460ddbc163ec657c064beac7e38dbd2efe

Identifiers

  • None

Masters.API.Tests.dll

Description:

Masters.API.Tests

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Masters.API.Tests.dll
MD5: 0d6edfdf97b96fa9df9cae068cf1e6a5
SHA1: a165371394295b87acc932cb247773512f0c9306
SHA256:656402e53c43927385e8321bae49c3f4b42490436dfcefd76a08978d68a9ec46

Identifiers

Masters.API.csproj

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj
MD5: b6dc4b330fdf8afa287b3ff0673c9114
SHA1: 7a181d4e9486b08f3ca513cfb447a99c3c521b26
SHA256:d3eb7ab096d01b57ada305614d764d656c7f03483cff04cd522b9a6127b401e5

Identifiers

  • None

Masters.API.dll

Description:

Masters.API

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.API.dll
MD5: 4ce0c5cca1ffb1ddae95e39d8d39a74d
SHA1: f09fd5c8a09ca44d89f76cfcf807d1c7af2a0fdf
SHA256:e31655e7f9d9ea668fd58684dddfa9af686a505d3a7e1f36d8a0557f2c3a6af5

Identifiers

Masters.API.exe

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.API.exe
MD5: f934999494beb77e9ae519f675a4ee42
SHA1: d4ada1de63e16b554913c5177e64b065e22bbd97
SHA256:5b7af9c5b6a638e44c1b894e13b8be178369bbca0a09293e73049885268a687d

Identifiers

  • None

Masters.Tests.csproj

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj
MD5: 9c903c009ef70a41ee07381b267876c2
SHA1: 7e7a6194c14189926395e1298a36e3c2904f71ef
SHA256:02b272918310449acbd45d3ff04901af2375b9da776bccfa540343f7faf56562

Identifiers

  • None

Masters.Tests.dll

Description:

Masters.Tests

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Masters.Tests.dll
MD5: 3e879109953da76806e0b8042f434075
SHA1: 55a98b28d49a1f09221c67d7d8c98580eaef230e
SHA256:32c5e5d88bc019534924ea3c7356eb4c2f9ec827831bbc9dd9049dad5e41e91e

Identifiers

Masters.csproj

File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj
MD5: f8197039c176ac43bacbbfd3c3900595
SHA1: f19606b09c74eb1dd2a759cc1574b20f4a54f941
SHA256:d33fd682e554468205a500d89eb80d4dd77b44e5781f7d969ea645a65c8d13ce

Identifiers

  • None

Masters.dll

Description:

Masters

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Masters.dll
MD5: d61df461594279c23e03a1c00c0667e4
SHA1: c0bb56aa04fd934a5b4f6cce5f9dd33663a76978
SHA256:d7ca33c56d3b2bda6a0d654bd8c6689a40798a8c1cca87c96c271468752e3adb

Identifiers

Merchant.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\Merchant.js
MD5: d273717716b8f0d5c5782bd0e87e0dd9
SHA1: 4c7efd52635d263274c4f35919660ee2d1f38fb9
SHA256:902b2e9afc1a6908fb4bedaa6aab661565456e0b8407e4422e8a02d622323aed

Identifiers

  • None

MerchantFlexFields.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\MerchantFlexFields.js
MD5: bcd7c4057cfc17dfae9d1a4bbd2175d3
SHA1: cac26be567516a16257d76e8c04cfd47cc901a3b
SHA256:eebf4e7f867c7df654db1cb0932523b963ca80e2560f9848a0acdf01eda8946a

Identifiers

  • None

MerchantRepository.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\MerchantRepository.js
MD5: ffc30ab4490188d4f5d5e4b9e0b58302
SHA1: 310b7db8e0dbd8561ce832ef34e5c36ad9b1acf0
SHA256:5e599319e3b6c2fca0a58eef183af85cc53eb2c9b5b203197f251dbe40612d1c

Identifiers

  • None

MerchantWebhookSubscriptionSwagger.js

File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\MerchantWebhookSubscriptionSwagger.js
MD5: aaf754d36b39b223aef3e0232da28806
SHA1: f8bb79615d55278ec5a662ca18815ba397fddb62
SHA256:b79278e8934f994aa7bb0d18ccd95db1e6c8768007e8c3dfdbed109eb5bdb3b9

Identifiers

  • None

Microsoft.AspNetCore.Authentication.JwtBearer.dll

Description:

Microsoft.AspNetCore.Authentication.JwtBearer

ASP.NET Core middleware that enables an application to receive an OpenID Connect bearer token.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.AspNetCore.Authentication.JwtBearer.dll
MD5: d787c7a72bc2b2c185412a976678170a
SHA1: d94a7115fa68f456cf5b78b4c24d3d4dd014af2e
SHA256:657875e470479035f4a2ce7bf7af20816749e4e639b11ca1483ba29911db24ed

Identifiers

Microsoft.AspNetCore.Authentication.JwtBearer:3.1.3

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

CVE-2021-34532 (OSSINDEX)  

ASP.NET Core and Visual Studio Information Disclosure Vulnerability
CWE-noinfo

CVSSv2:
  • Base Score: LOW (2.0999999046325684)
  • Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:Microsoft.AspNetCore.Authentication.JwtBearer:3.1.3:*:*:*:*:*:*:*

Microsoft.AspNetCore.Hosting.Server.Abstractions.dll

Description:

Microsoft.AspNetCore.Hosting.Server.Abstractions

ASP.NET Core hosting server abstractions for web applications.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.AspNetCore.Hosting.Server.Abstractions.dll
MD5: 191047a4897093d8750268ba063784bd
SHA1: 704f5cb461f1065eabfa9c99e937cc54329ec52f
SHA256:2aa879f203ea973722e1e8c862baaae6bc165f8b70ac24918873af3aa20c906d

Identifiers

Microsoft.AspNetCore.JsonPatch.dll

Description:

Microsoft.AspNetCore.JsonPatch

ASP.NET Core support for JSON PATCH.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.AspNetCore.JsonPatch.dll
MD5: c37498e27a9761e82ae24e1e757f3691
SHA1: 0592f910f2c039fb786085397b800ce62c454174
SHA256:f721bfbf0071870dbbeb2497b51dfacceb472e1d35fb757b308d932ecb3f497b

Identifiers

Microsoft.AspNetCore.Mvc.NewtonsoftJson:3.1.0

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

Microsoft.DotNet.PlatformAbstractions.dll

Description:

Abstractions for making code that uses file system and environment testable.

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.DotNet.PlatformAbstractions.dll
MD5: a69ee0c1195620088b4efb1e8c9dca3d
SHA1: cede41194639465753550adecbecf32e85e582c7
SHA256:359451c3e3be25f7c383713787d1a3e762579c648bbce8e37b5010c0622f9681

Identifiers

Microsoft.EntityFrameworkCore.Abstractions.dll

Description:

Microsoft.EntityFrameworkCore.Abstractions

Provides abstractions and attributes that are used to configure Entity Framework Core

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dll
MD5: 10d7e7d4107ff1292ce723a0e295a210
SHA1: 064b9fb9c0af946f0524a4ae0939f0e5235518e2
SHA256:000b5e98a2973b06a7e9a40be6a640aa87fec8d4c5be870444a62f1e1d999f48

Identifiers

Microsoft.EntityFrameworkCore.Abstractions.dll

Description:

Microsoft.EntityFrameworkCore.Abstractions

Provides abstractions and attributes that are used to configure Entity Framework Core

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Abstractions.dll
MD5: 86b1d7511868631ac5a699abfad28641
SHA1: b7705d526a2d2297231b463509727590fcef3dd8
SHA256:5fa213113051002988514ca4a25df91d4a8166d7b8ae6b49de419895d7acc1e1

Identifiers

Microsoft.EntityFrameworkCore.Design.dll

Description:

Microsoft.EntityFrameworkCore.Design

Shared design-time components for Entity Framework Core tools.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Design.dll
MD5: d0cbe8314f64cd49878b2f5ef82f1293
SHA1: 71795ba9adb3c4986b43683103ddb7b95da6cf74
SHA256:337f3880797f064a3cb870cda7ffedebeb37b7a9b73ffe9940e761db616e8ef0

Identifiers

Microsoft.EntityFrameworkCore.Relational.dll

Description:

Microsoft.EntityFrameworkCore.Relational

Shared Entity Framework Core components for relational database providers.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dll
MD5: 8962aec8fbc3c75a3e089fc4640544b9
SHA1: 43062bd4185c0696971e2412c5a70e09224d2606
SHA256:8a2d716851524bd05cc4a16778d4edf497c65449a876f15922e48285cc79180c

Identifiers

Microsoft.EntityFrameworkCore.Relational.dll

Description:

Microsoft.EntityFrameworkCore.Relational

Shared Entity Framework Core components for relational database providers.

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Relational.dll
MD5: 7fc88f8521204fb8dd3d88fccfc95019
SHA1: 0355e8588fe03caf93c7b8c62e2d00f1c6466b6c
SHA256:9fdf3e18c8652204ad369c4fd3ebf6daa789c2f3c2cdac6583030007c32a95d2

Identifiers

Microsoft.EntityFrameworkCore.Sqlite.dll

Description:

Microsoft.EntityFrameworkCore.Sqlite

SQLite database provider for Entity Framework Core. This package does not include a copy of the native SQLite library.

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.Sqlite.dll
MD5: ac226a58c78c52773d582aa4f5624723
SHA1: dc14ffc052d87d90416e989f9bbdb3de7998232d
SHA256:5623d0f3c48a81b79f087d26a0202d947c2a48cc80d6a0a09280979835a07e5d

Identifiers

Microsoft.EntityFrameworkCore.dll

Description:

Microsoft.EntityFrameworkCore

Entity Framework Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations. EF Core works with SQL Server, Azure SQL Database, SQLite, Azure Cosmos DB, MySQL, PostgreSQL, and other databases through a provider plugin API.

Commonly Used Types:
Microsoft.EntityFrameworkCore.DbContext
Microsoft.EntityFrameworkCore.DbSet
    

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dll
MD5: 852c7e8791f22fdc1c0be01a35b81889
SHA1: c9779da9a726f2465fcd0c3e654bb6cc9ea4bf27
SHA256:1c09d5a5a846943a468e444515abccdafe4c787dc003ef5f5d0230baf381c461

Identifiers

Microsoft.EntityFrameworkCore.dll

Description:

Microsoft.EntityFrameworkCore

Entity Framework Core is a modern object-database mapper for .NET. It supports LINQ queries, change tracking, updates, and schema migrations. EF Core works with SQL Server, Azure SQL Database, SQLite, Azure Cosmos DB, MySQL, PostgreSQL, and other databases through a provider plugin API.

Commonly Used Types:
Microsoft.EntityFrameworkCore.DbContext
Microsoft.EntityFrameworkCore.DbSet
    

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.EntityFrameworkCore.dll
MD5: 73146811272dc2b5353b3cb9b3e26caa
SHA1: 42708abdcb5d9b477ecebfc4be5f29776b860c5b
SHA256:da96237f5b353adb2fe4162101668df82453e96d0d82ffecf61bc24c19b18738

Identifiers

Microsoft.Extensions.Caching.Abstractions.dll

Description:

Microsoft.Extensions.Caching.Abstractions

Caching abstractions for in-memory cache and distributed cache.

Commonly Used Types:
Microsoft.Extensions.Caching.Distributed.IDistributedCache
Microsoft.Extensions.Caching.Memory.IMemoryCache

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Caching.Abstractions.dll
MD5: ad8f9c7c55b0af08132defe0126cb883
SHA1: 5af0968158dbf4be321c91137d204dc94e9d6107
SHA256:58b71920a96072dda78f8869681bd95df1e8ad01bd0c7f41fc567620a78f1b62

Identifiers

Microsoft.Extensions.Caching.Memory.dll

Description:

Microsoft.Extensions.Caching.Memory

In-memory cache implementation of Microsoft.Extensions.Caching.Memory.IMemoryCache.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Caching.Memory.dll
MD5: 4b05e228ce48e5aa53361feb8d30398a
SHA1: d71b874fee66d6f8bf003b97869050f466c28db7
SHA256:68e25eb71dab3eea401ac5e0d8d0912f9a7eff17733325126e69f6e2dc567d0c

Identifiers

Microsoft.Extensions.Configuration.Abstractions.dll

Description:

Microsoft.Extensions.Configuration.Abstractions

Abstractions of key-value pair based configuration.

Commonly Used Types:
Microsoft.Extensions.Configuration.IConfiguration
Microsoft.Extensions.Configuration.IConfigurationBuilder
Microsoft.Extensions.Configuration.IConfigurationProvider
Microsoft.Extensions.Configuration.IConfigurationRoot
Microsoft.Extensions.Configuration.IConfigurationSection

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Abstractions.dll
MD5: 134885709f7087d3a1bad3108179578a
SHA1: c524c7d46a343b75a64bf52b19e3c70c453f9061
SHA256:e4eb5eb7e28a5548cd904fe1a9c3569adef91f52b654db8a3c56a0a5177a09eb

Identifiers

Microsoft.Extensions.Configuration.EnvironmentVariables.dll

Description:

Microsoft.Extensions.Configuration.EnvironmentVariables

Environment variables configuration provider implementation for Microsoft.Extensions.Configuration.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.EnvironmentVariables.dll
MD5: 08f52a0ff6e9a3602259930674f95c5e
SHA1: 4fd2e59545e6c845f8f9de6ce8fc4540acf1aa25
SHA256:94fb00fe869f78b572e8564d2700b143f392a5ab7c110e8c81981d5edbf632f7

Identifiers

Microsoft.Extensions.Configuration.EnvironmentVariables:6.0.1

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj

Identifiers

Microsoft.Extensions.Configuration.FileExtensions.dll

Description:

Microsoft.Extensions.Configuration.FileExtensions

Extension methods for configuring file-based configuration providers for Microsoft.Extensions.Configuration.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.FileExtensions.dll
MD5: 3604168610204920999aeb27fa52ce14
SHA1: 5ad4642c871d47e022080f5c707da159b432efe7
SHA256:9f67d13f6ff5b463736821793d4e218134a51caf3ce8ebe205fd9801db3735d1

Identifiers

Microsoft.Extensions.Configuration.Json.dll

Description:

Microsoft.Extensions.Configuration.Json

JSON configuration provider implementation for Microsoft.Extensions.Configuration.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Configuration.Json.dll
MD5: f632ba94ae101b3a171d59801a2d5c19
SHA1: 182a3cdc49febc6ce3f96056c399af1311129af7
SHA256:476f3fcb02d6c48705c4ab43223d08c42f9b5e2e2ead7e811de2cbdb847ebd34

Identifiers

Microsoft.Extensions.Configuration.Json:6.0.0

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj

Identifiers

Microsoft.Extensions.Configuration.dll

Description:

Microsoft.Extensions.Configuration

Implementation of key-value pair based configuration for Microsoft.Extensions.Configuration. Includes the memory configuration provider.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Configuration.dll
MD5: 2607271d374e06d794599b10cb1a9f8c
SHA1: 5c5ad43797bbe3b9ab09d9b60ca34f2053f75eec
SHA256:567cce7f8eb0cf3bb445ba455af1fdb9c4e0afbb6e10bbe8c3930682295182d1

Identifiers

Microsoft.Extensions.Configuration:6.0.1

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj

Identifiers

Microsoft.Extensions.DependencyInjection.Abstractions.dll

Description:

Microsoft.Extensions.DependencyInjection.Abstractions

Abstractions for dependency injection.

Commonly Used Types:
Microsoft.Extensions.DependencyInjection.IServiceCollection

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.Abstractions.dll
MD5: d6cfda4e1c948aeb3e5d57376334375f
SHA1: cb8c35306afd15358104ecfe70e724ad9c753e6f
SHA256:9ccd830351aa28bc683d4f8d1cefd9e724161f972d25bfb64eee5bf55c48c5e3

Identifiers

Microsoft.Extensions.DependencyInjection.dll

Description:

Microsoft.Extensions.DependencyInjection

Default implementation of dependency injection for Microsoft.Extensions.DependencyInjection.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.DependencyInjection.dll
MD5: f5fc619ac21d262950da7f5332384bf3
SHA1: 6823e8981cdaff3dd3de262094915a7661e2996d
SHA256:13e1108252ab13d657a67c6b9738ea350ba67b876bc50e4933af0cd2e0228001

Identifiers

Microsoft.Extensions.DependencyModel.dll

Description:

Microsoft.Extensions.DependencyModel

Abstractions for reading `.deps` files.

Commonly Used Types:
Microsoft.Extensions.DependencyModel.DependencyContext

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyModel.dll
MD5: b0b997723e8a50f98f8ee30975338117
SHA1: 9ef5542d260d0123c62e50006cd4b433feaf4626
SHA256:b6406254657a68f84df707987a9319dafbd2e8681fd2e384f3c7ee5883510078

Identifiers

Microsoft.Extensions.DependencyModel.dll

Description:

Abstractions for reading `.deps` files.

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.Extensions.DependencyModel.dll
MD5: 13f8831d108ed271d068990df780dac7
SHA1: 8ea6b66104aff050ecaf5be489caee177987f56b
SHA256:7577357b33958c973cc296030ca19a06914100dc320fa1c7e985b06dfbec8df3

Identifiers

Microsoft.Extensions.FileProviders.Abstractions.dll

Description:

Microsoft.Extensions.FileProviders.Abstractions

Abstractions of files and directories.

Commonly Used Types:
Microsoft.Extensions.FileProviders.IDirectoryContents
Microsoft.Extensions.FileProviders.IFileInfo
Microsoft.Extensions.FileProviders.IFileProvider

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dll
MD5: 3644e5e1981b0bde71ed60f5e3754ffb
SHA1: 3029f45a1397291b4e7eee9db9b5dcde5a47ab7d
SHA256:ecfcef11c42fa4ad5cf2d4d7f553c8f0017e5eb7a4a9b032b4d0505c98ef4ef4

Identifiers

Microsoft.Extensions.FileProviders.Abstractions.dll

Description:

Microsoft.Extensions.FileProviders.Abstractions

Abstractions of files and directories.
Commonly used types:
Microsoft.Extensions.FileProviders.IDirectoryContents
Microsoft.Extensions.FileProviders.IFileInfo
Microsoft.Extensions.FileProviders.IFileProvider

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Abstractions.dll
MD5: 25394afea2d4cb8f8d77e4c916bbc89b
SHA1: 0c66003e39b6f6f279041d0b02a53b42f10a8f9d
SHA256:5a6116fd240c281159ea2064083edde1b7e12287da3943a8cf94da2344af9685

Identifiers

Microsoft.Extensions.FileProviders.Physical.dll

Description:

Microsoft.Extensions.FileProviders.Physical

File provider for physical files for Microsoft.Extensions.FileProviders.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileProviders.Physical.dll
MD5: 16b277856e7168ca27e32cbf0112eaaf
SHA1: 616a44c9b1b0d4d6ad6ad37b41556a6e727cc3e5
SHA256:b17ba3bc63190e004167d1ea7dc12af57b0cd29bf0ca13edeb4340f6a2c3cc62

Identifiers

Microsoft.Extensions.FileSystemGlobbing.dll

Description:

Microsoft.Extensions.FileSystemGlobbing

File system globbing to find files matching a specified pattern.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.FileSystemGlobbing.dll
MD5: 35af9a93caeb8e69c1b41c99ed74b4f5
SHA1: e0f87d149cb7a7bd30ec407f801f4ea4fa210f12
SHA256:be2897386d1fc215a86d3d1343564e262641751bd846559b0ed8f3fba77cb102

Identifiers

Microsoft.Extensions.Hosting.Abstractions.dll

Description:

Microsoft.Extensions.Hosting.Abstractions

.NET Core hosting and startup abstractions for applications.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Hosting.Abstractions.dll
MD5: 11fd3e7f5dcb45e347e70b4e94db2a00
SHA1: 075ae0367fd7707fa2a35aba38089f119ef20b24
SHA256:71b4f978afcce58ae5ca51e9c1b6c4c7c54b42f8ebe7fc69be72854e51fa7ba6

Identifiers

Microsoft.Extensions.Hosting:3.1.3

File Path: D:\Auropayrepos\Masters\src\Masters.API\Masters.API.csproj

Identifiers

Microsoft.Extensions.Logging.Abstractions.dll

Description:

Microsoft.Extensions.Logging.Abstractions

Logging abstractions for Microsoft.Extensions.Logging.

Commonly Used Types:
Microsoft.Extensions.Logging.ILogger
Microsoft.Extensions.Logging.ILoggerFactory
Microsoft.Extensions.Logging.ILogger<TCategoryName>
Microsoft.Extensions.Logging.LogLevel
Microsoft.Extensions.Logging.Logger<T>
Microsoft.Extensions.Logging.LoggerMessage
Microsoft.Extensions.Logging.Abstractions.NullLogger

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.Logging.Abstractions.dll
MD5: 2d352734d0b1b60b04f29be9f21189b2
SHA1: 0d8799d2f98dedc3b0af806a539240c5f52a4826
SHA256:c3e73ec5f2e1f10200c25ba1ba0c8f73cb0fbc09a6202fd44f19ee813ece89da

Identifiers

Microsoft.Extensions.Logging.Abstractions:6.0.1

File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj

Identifiers

Microsoft.Extensions.Logging.dll

Description:

Microsoft.Extensions.Logging

Logging infrastructure default implementation for Microsoft.Extensions.Logging.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Logging.dll
MD5: 037fa19d37892f003cb18c3f4f070b66
SHA1: 7bea9201a90f69ff958f5bf64e959d1e4021f252
SHA256:183650081b551dfad967a7cbf79946a229cb79458b8d04a12db7c44b03bb9ab7

Identifiers

Microsoft.Extensions.Logging:6.0.0

File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj

Identifiers

Microsoft.Extensions.Options.dll

Description:

Microsoft.Extensions.Options

Provides a strongly typed way of specifying and accessing settings using dependency injection.

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Options.dll
MD5: 950440793a182cc76ffc7f7280e55daf
SHA1: 6ec0c1fe1332912086247080b55b06623c78326e
SHA256:786112cb2f6646ef1170219a8c0bb813c9f14a6781e67c6266414f55a679565d

Identifiers

Microsoft.Extensions.PlatformAbstractions.dll

Description:

Abstractions that unify behavior and API across .NET Framework, .NET Core and Mono

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.Extensions.PlatformAbstractions.dll
MD5: aa4d6950dcb5906324f8d7a8f72c4639
SHA1: 1f9251a7ad5accf0530552a7970962ed91f583d6
SHA256:d4f515a2f586bf503a61a41e9b91417884241fa031b08dba1cda715235207b7e

Identifiers

Microsoft.Extensions.Primitives.dll

Description:

Microsoft.Extensions.Primitives

Primitives shared by framework extensions. Commonly used types include:

Commonly Used Types:
Microsoft.Extensions.Primitives.IChangeToken
Microsoft.Extensions.Primitives.StringValues
Microsoft.Extensions.Primitives.StringSegment

File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\Microsoft.Extensions.Primitives.dll
MD5: a53d11973f75b15bef19c16a35ffb432
SHA1: 376636c20cee083da54d4146479032170ec7231b
SHA256:8ce9a85927ec7507b11ffe90080e7a811d51304a9e8b1da20c350159ba403902

Identifiers

Microsoft.IdentityModel.JsonWebTokens.dll

Description:

Microsoft.IdentityModel.JsonWebTokens

Includes types that provide support for creating, serializing and validating JSON Web Tokens.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.JsonWebTokens.dll
MD5: 627b852a21fe33f452dfad41e0b422f7
SHA1: 9f2c57648740a89666a9fa7edc3ff50dd3b8a8e9
SHA256:4b9e70be0440f3d619a66c6e3d258b0ecd95baf002805d78009f447e02192696

Identifiers

  • pkg:generic/Microsoft.IdentityModel.JsonWebTokens@5.6.0.61018  (Confidence:Medium)
  • cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:json_web_token_project:json_web_token:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2024-21319  

Microsoft Identity Denial of service vulnerability
CWE-20 Improper Input Validation, NVD-CWE-noinfo

CVSSv3:
  • Base Score: MEDIUM (6.8)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A

References:

Vulnerable Software & Versions: (show all)

Microsoft.IdentityModel.Protocols.OpenIdConnect.dll

Description:

Microsoft.IdentityModel.Protocols.OpenIdConnect

Includes types that provide support for OpenIdConnect protocol.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Protocols.OpenIdConnect.dll
MD5: 798c630436e7a44b6cd619e1da2c3fdf
SHA1: 4690c4ea6a8133a55e3f4e5f8cd0f5912050082f
SHA256:19b5ed3bd950a0ff92b27b3e471af561fa2a15161cd9c5f8abddceb2dc4b3848

Identifiers

CVE-2024-21319  

Microsoft Identity Denial of service vulnerability
CWE-20 Improper Input Validation, NVD-CWE-noinfo

CVSSv3:
  • Base Score: MEDIUM (6.8)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A

References:

Vulnerable Software & Versions: (show all)

Microsoft.IdentityModel.Protocols.dll

Description:

Microsoft.IdentityModel.Protocols

Provides base protocol support for OpenIdConnect and WsFederation.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Protocols.dll
MD5: 9be0a192beff00f0824fadfe06e378e7
SHA1: 74e00a65d15440e81d70a1e0288a7bc6e3d176dc
SHA256:20396d1864b00446cb8da5ea0cc6b447a40bb715591122c4dfa3eedb695b8409

Identifiers

  • pkg:generic/Microsoft.IdentityModel.Protocols@5.5.0.60624  (Confidence:Medium)
  • cpe:2.3:a:identitymodel_project:identitymodel:5.5.0.60624:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identity_model:5.5.0.60624:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identitymodel:5.5.0.60624:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2024-21319  

Microsoft Identity Denial of service vulnerability
CWE-20 Improper Input Validation, NVD-CWE-noinfo

CVSSv3:
  • Base Score: MEDIUM (6.8)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A

References:

Vulnerable Software & Versions: (show all)

Microsoft.IdentityModel.Tokens.dll

Description:

Microsoft.IdentityModel.Tokens

Includes types that provide support for SecurityTokens, Cryptographic operations: Signing, Verifying Signatures, Encryption.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Microsoft.IdentityModel.Tokens.dll
MD5: 4ed422e1d4b93851a08b340de68fccf5
SHA1: 0a2d0ca5f6ab2849da70b1cabe779e579c831ca3
SHA256:cb0da06c03f5628272465d035792f079544fbb3225c3279bbafbf9b590434f7e

Identifiers

  • pkg:generic/Microsoft.IdentityModel.Tokens@5.6.0.61018  (Confidence:Medium)
  • cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2024-21319  

Microsoft Identity Denial of service vulnerability
CWE-20 Improper Input Validation, NVD-CWE-noinfo

CVSSv3:
  • Base Score: MEDIUM (6.8)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A

References:

Vulnerable Software & Versions: (show all)

Microsoft.NET.Test.Sdk:15.5.0

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj

Identifiers

Microsoft.NET.Test.Sdk:15.8.0

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\Masters.Tests.csproj

Identifiers

Microsoft.NET.Test.Sdk:16.5.0

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj

Identifiers

Microsoft.TestPlatform.CrossPlatEngine.dll

Description:

Microsoft.TestPlatform.CrossPlatEngine

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.TestPlatform.CrossPlatEngine.dll
MD5: 01c8f086a764cda2a400c92e67ed5599
SHA1: c3fbc29e95bb9fec54e9d62e966f436e95d3f0a1
SHA256:118c7466f1ced94c444ce30084ef5979a99f5c375be61002e31f13bb19fc961c

Identifiers

Microsoft.TestPlatform.CrossPlatEngine.resources.dll

Description:

Microsoft.TestPlatform.CrossPlatEngine

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\cs\Microsoft.TestPlatform.CrossPlatEngine.resources.dll
MD5: eaf091e4308b282336ea394404e2120e
SHA1: 00e5bd4e631a6932ac12ea9e234299da6075c47c
SHA256:e092db6e9db5b34167b44e4b9d17239977e0c0b6a0ffde5a6294031ce13d8e5b

Identifiers

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Description:

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Microsoft.VisualStudio.CodeCoverage.Shim.dll

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dll
MD5: a733cde226e183c593ab278fb21f22b2
SHA1: 96ccdd267aade97cdc16f9a39fa34fd389764e55
SHA256:d8a241ee38f903c0a24356df4c8f83094215182df1e9d9df1c8468453e5b68ab

Identifiers

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Description:

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Microsoft.VisualStudio.CodeCoverage.Shim.dll

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dll
MD5: 1a18c741a726841e30e21c7e847e3206
SHA1: 24a8d6fb78b1e27e8c51659b5255b4e950904626
SHA256:3820864cf551ab42ec3cbd5e2e743479c393c8728da58c0849b95b7b6ed7ad70

Identifiers

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Description:

Microsoft.VisualStudio.CodeCoverage.Shim.dll

Microsoft.VisualStudio.CodeCoverage.Shim.dll

File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.CodeCoverage.Shim.dll
MD5: 18abc24fbcd39e398b03e6ec0dac1d15
SHA1: 5232d8f57f098056bed6ef39e927c91f3dd68011
SHA256:d7cdd2d3e02ada6de7b99d6795bea37020a3040c1232f253e6fd5785346250c0

Identifiers

Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll

Description:

PlatformServices.Interface

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll
MD5: 3d537dbd003448bedf2cc940a8832645
SHA1: 142311338a3ec2959cafe044a04e019324286936
SHA256:62b8e52d58b4ba13a852c3c18ac974e9f269eb0cb5850da3f3dcffe6670c0f03

Identifiers

Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll

Description:

PlatformServices.Interface

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.Interface.dll
MD5: 5572e3b8786bcf5f181eac2203553d94
SHA1: 6fcb801907e67fd6f91debcdad7988fab9e891a5
SHA256:80df4d091bf9dab0d41aa65d97b2094bf984d4e907c65b32353130931250c3d6

Identifiers

Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll

Description:

Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.MSTestAdapter.PlatformServices.dll
MD5: 405b2ab754b354d852c51ab91e5cd575
SHA1: 1852468f91317c89187f9866a5ffe4265c688e0a
SHA256:6c3fecb7469357b20f4b8410725497904be939f40a916b3c19aab140eb461099

Identifiers

Microsoft.VisualStudio.TestPlatform.TestFramework.dll

Description:

MSTest.Core

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.TestFramework.dll
MD5: 28832f1c14c7956d7e9cf384fb708733
SHA1: 9d1a06d157634e2b7f60ab7ca10c67260c720b31
SHA256:f3d74b362314092cc918338ec5f3e561dd74b29ba4eb46a2921ba0d3c9753709

Identifiers

Microsoft.VisualStudio.TestPlatform.TestFramework.dll

Description:

MSTest.Core

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Microsoft.VisualStudio.TestPlatform.TestFramework.dll
MD5: 77102e3f0739f48e286125bc91f9c794
SHA1: 448feebc568322041520827dbffaa8e89c33d9e8
SHA256:ccd11b94c40390a6f1593744a3daabceb39a629783122e23639f35c112874a0e

Identifiers

Moq.dll

Description:

Moq

File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\Moq.dll
MD5: 29ff764e845264b45abf2086e93a841f
SHA1: 4e07e55eacb8077c2b3f7c456eaa31e0f3a81b2c
SHA256:ebd008730a851d52fba258188f0e83326faf55b32979725793a043b9d280be18

Identifiers

Moq.dll

Description:

Moq

File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\Moq.dll
MD5: 17232c32d99ba292d4ba2a596dbca5f1
SHA1: 4c5f8b2c6a2f8eba75baddc484fbef7fe197b4df
SHA256:f7f162572905875a235f565701c8cd23ad540d598f1aeade6d4eb1b93617a71d

Identifiers

MySqlConnector.dll

Description:

MySqlConnector

A truly async MySQL ADO.NET provider, supporting MySQL Server, MariaDB, Percona Server, Amazon Aurora, Azure Database for MySQL and more.

File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\MySqlConnector.dll
MD5: 19353dd202c1b45717d219cc3f8d14d0
SHA1: 88efc3f5e1c11a2ce724357f8aaa60f0bcca49cc
SHA256:03186b4706c83df746179c56d9492dd06557af10c57f809f792d54da46e2b8b6

Identifiers

  • pkg:generic/MySqlConnector@2.1.2  (Confidence:Medium)
  • cpe:2.3:a:mysql:mysql:2.1.2:*:*:*:*:*:*:*  (Confidence:Low)  
  • cpe:2.3:a:www-sql_project:www-sql:2.1.2:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2017-15945  

The installation scripts in the Gentoo dev-db/mysql, dev-db/mariadb, dev-db/percona-server, dev-db/mysql-cluster, and dev-db/mariadb-galera packages before 2017-09-29 have chown calls for user-writable directory trees, which allows local users to gain privileges by leveraging access to the mysql account for creation of a link.
CWE-732 Incorrect Permission Assignment for Critical Resource

CVSSv3:
  • Base Score: HIGH (7.8)
  • Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.8/RC:R/MAV:A
CVSSv2:
  • Base Score: HIGH (7.2)
  • Vector: /AV:L/AC:L/Au:N/C:C/I:C/A:C

References:

Vulnerable Software & Versions: (show all)

CVE-2009-4028  

The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
CWE-20 Improper Input Validation

CVSSv2:
  • Base Score: MEDIUM (6.8)
  • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

References:

Vulnerable Software & Versions: (show all)

CVE-2010-1621  

The mysql_uninstall_plugin function in sql/sql_plugin.cc in MySQL 5.1 before 5.1.46 does not check privileges before uninstalling a plugin, which allows remote attackers to uninstall arbitrary plugins via the UNINSTALL PLUGIN command.
CWE-264 Permissions, Privileges, and Access Controls

CVSSv2:
  • Base Score: MEDIUM (5.0)
  • Vector: /AV:N/AC:L/Au:N/C:N/I:P/A:N

References:

    Vulnerable Software & Versions:

    CVE-2007-2691  

    MySQL before 4.1.23, 5.0.x before 5.0.42, and 5.1.x before 5.1.18 does not require the DROP privilege for RENAME TABLE statements, which allows remote authenticated users to rename arbitrary tables.
    NVD-CWE-Other

    CVSSv2:
    • Base Score: MEDIUM (4.9)
    • Vector: /AV:N/AC:M/Au:S/C:N/I:P/A:P

    References:

    Vulnerable Software & Versions: (show all)

    CVE-2015-2575  

    Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
    NVD-CWE-noinfo

    CVSSv2:
    • Base Score: MEDIUM (4.9)
    • Vector: /AV:N/AC:M/Au:S/C:P/I:P/A:N

    References:

    Vulnerable Software & Versions:

    CVE-2007-5925  

    The convert_search_mode_to_innobase function in ha_innodb.cc in the InnoDB engine in MySQL 5.1.23-BK and earlier allows remote authenticated users to cause a denial of service (database crash) via a certain CONTAINS operation on an indexed column, which triggers an assertion error.
    CWE-20 Improper Input Validation

    CVSSv2:
    • Base Score: MEDIUM (4.0)
    • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P

    References:

      Vulnerable Software & Versions:

      CVE-2009-0819  

      sql/item_xmlfunc.cc in MySQL 5.1 before 5.1.32 and 6.0 before 6.0.10 allows remote authenticated users to cause a denial of service (crash) via "an XPath expression employing a scalar expression as a FilterExpr with ExtractValue() or UpdateXML()," which triggers an assertion failure.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: MEDIUM (4.0)
      • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2010-3677  

      Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
      CWE-399 Resource Management Errors

      CVSSv2:
      • Base Score: MEDIUM (4.0)
      • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2010-3682  

      Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: MEDIUM (4.0)
      • Vector: /AV:N/AC:L/Au:S/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2010-1626  

      MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
      CWE-264 Permissions, Privileges, and Access Controls, CWE-59 Improper Link Resolution Before File Access ('Link Following')

      CVSSv2:
      • Base Score: LOW (3.6)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2007-1420  

      MySQL 5.x before 5.0.36 allows local users to cause a denial of service (database crash) by performing information_schema table subselects and using ORDER BY to sort a single-row result, which prevents certain structure elements from being initialized and triggers a NULL dereference in the filesort function.
      NVD-CWE-Other

      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      Newtonsoft.Json.Bson.dll

      Description:

      Json.NET BSON .NET Standard 2.0
      
      Json.NET BSON adds support for reading and writing BSON

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Newtonsoft.Json.Bson.dll
      MD5: 46944e52dbb2982ea49a297902b91ea8
      SHA1: 0ed43a73f49e0df7b2fa681a627cad7e25074165
      SHA256:f3c56166d7f90296bbe6b03f64335623c3165ed25948288f1f316fa74dd8327f

      Identifiers

      CVE-2024-21907  

      Newtonsoft.Json before version 13.0.1 is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the JsonConvert.DeserializeObject method may trigger a StackOverflow exception resulting in denial of service. Depending on the usage of the library, an unauthenticated and remote attacker may be able to cause the denial of service condition.
      
      CWE-755 Improper Handling of Exceptional Conditions

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions:

      Newtonsoft.Json.dll

      Description:

      Json.NET .NET Standard 2.0
      
      Json.NET is a popular high-performance JSON framework for .NET

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Newtonsoft.Json.dll
      MD5: 916d32b899f1bc23b209648d007b99fd
      SHA1: e3673d05d46f29e68241d4536bddf18cdd0a913d
      SHA256:72cf291d4bab0edd08a9b07c6173e1e7ad1abb7ab727fd7044bf6305d7515661

      Identifiers

      NuGet.Frameworks.dll

      Description:

      NuGet.Frameworks
      
      The understanding of target frameworks for NuGet.Packaging.

      File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\NuGet.Frameworks.dll
      MD5: a943ff4524e20e7c456efb37cdbf6952
      SHA1: c1e695466b22abad8c2908c64fa8bcc8e3d9b383
      SHA256:bdef879f0a4ab2ad97fe934f54e30aee0d06ad06a3ef292933308fca34906ef8

      Identifiers

      Occurrence.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\Occurrence.js
      MD5: c4863b7d114b640dfc0bcede07866b74
      SHA1: 5b7f78f12a7f6f57dbfa3c2847566cad449ca5da
      SHA256:96ba9342a6bef69b3ab247fef259347d3ad81106f7d65071f972fdeea25a9ad6

      Identifiers

      • None

      Partner.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\model\Partner.js
      MD5: ea3c65bd5438d575bc22ae0fed1dd7b2
      SHA1: bf447361669aabc5a7dccf2afef05b61be6c2d7e
      SHA256:fa186a3683e8558db6aa080930d4d73e66fec752fef78417f4f2b3f34d2aa9ab

      Identifiers

      • None

      PartnerCustomerMapping.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\models\PartnerCustomerMapping.js
      MD5: 2b1d9b8784f22191693a6c5b468c9958
      SHA1: a740a1ff1d3d107979714d9e4a0c71b0312e7edb
      SHA256:987e5af18db567a6163776ec0ebb2e755f5dc9f1ce3b6d6586ca18f59411ebdb

      Identifiers

      • None

      PartnerCustomerMappingRepository.js

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\repository\PartnerCustomerMappingRepository.js
      MD5: 87007e8334ae47fa5d9d167c5f2069d1
      SHA1: c047c2c4b30e88462f25c55b076cda55ee3a34f1
      SHA256:d499c0a4b6627bcf8782c8760efa136c38d3819bc981d290b33db9a244ebf850

      Identifiers

      • None

      PartnerCustomerMappingRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\PartnerCustomerMappingRepository.js
      MD5: 339bab9ab78d38a63cecdc4045870b24
      SHA1: cdd9e5e71f0b38dec114f7c680379db026d4505d
      SHA256:aed01e01495a03b469380330ff198ce737892ddc2c785f46e1d2d0366336492d

      Identifiers

      • None

      PartnerHandler.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\PartnerHandler.js
      MD5: 942723d6c2563c80e0e3347f3785ed58
      SHA1: f94dec5e3f6e150e776e59718ae1ec5d935253e2
      SHA256:616fe23cadef9faec580ef221e21fa0a65ed08107fe83edca90d2e97b9fbbb52

      Identifiers

      • None

      PartnerRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\PartnerRepository.js
      MD5: a945664c6ffa442c0c8459b6c876ad35
      SHA1: 524955839db9df42a783dbf8ead4f4eae9dcd4f1
      SHA256:fbefdbdd4828b137ba30d9b990cf6a26636ee857a1374fe0f454a6bca8e3a49f

      Identifiers

      • None

      PartnerRepository.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\repositories\PartnerRepository.js
      MD5: 0c3a1337cb85989559531ed073337a9f
      SHA1: fa15aedecb5e4da84d6e63875dfd1882c5c91abd
      SHA256:2beb46e31b07ff471c43cffbb8f1ada1dbd0f328f8fa3c611a7dbaf3e59937b4

      Identifiers

      • None

      PartnerStatus.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\PartnerStatus.js
      MD5: e6dd816814c279a95a026c84685d68d6
      SHA1: fa55390e17799a355e8206aa851fae9282e101fe
      SHA256:a68478a920d0111cb786f9a02607351fad1465ea1453fea53f6b99a51c526d0c

      Identifiers

      • None

      PartnerStatus.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\constants\PartnerStatus.js
      MD5: bc61d53822fff6252f9c7ed15ed08995
      SHA1: 0a9b44b7cd7ee5c5bc4299e32ba5ff938bffad17
      SHA256:2dc1d88408ba98d821ce481f011640030a49496ac2df473329bcbd81d7c3096a

      Identifiers

      • None

      PaymentFormConfigurationSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\PaymentFormConfigurationSwagger.js
      MD5: 6cc34b5e13cb06feacf7b188cda69466
      SHA1: 768f0f8506d4cf50a372a83ee3c71ed981464536
      SHA256:fa599d3d407e606aea9054f3f66a8dfa21a92be66b30e4a764f51eb43103e97d

      Identifiers

      • None

      Pomelo.EntityFrameworkCore.MySql.dll

      Description:

      Pomelo.EntityFrameworkCore.MySql
      
      Pomelo's MySQL database provider for Entity Framework Core.

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\Pomelo.EntityFrameworkCore.MySql.dll
      MD5: ee4be55be7d811e11a08aa9270485aee
      SHA1: 464e2c280ff37c3e75fc5745cab976b497a28821
      SHA256:3f7ff884fcbf3ba36953ccb53f1f345548d904b46dd44c73590dafe436624c13

      Identifiers

      ProductStatus.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\ProductStatus.js
      MD5: 2045f0e6752b962f7f494defe920122a
      SHA1: 0c1b314858f7beb49d2584343df896db44544562
      SHA256:45ff3a672e898ac5a1e2f15356e1daf073424719a797ac7d314a943031734b59

      Identifiers

      • None

      RegisterFeeRoutes.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\RegisterFeeRoutes.js
      MD5: 43b9b5816cce842e08c45af84b8860bb
      SHA1: a5857339c0c2b2991865f947bce11bc81827be99
      SHA256:d40980f7db9d4255c61f04834960ec6f95c34c0bc437441b2a0d16f878116390

      Identifiers

      • None

      RegisterTaxRoutes.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\RegisterTaxRoutes.js
      MD5: 92e110b893d0f799d35950c2cc55b884
      SHA1: ece15aba19265b51fe7fcf900aa08a4c5e7b8dd8
      SHA256:201d680e93dbb5fe3fe30f516b0c57cb842e83dd40a1d501dd6d16bfa8cfcca9

      Identifiers

      • None

      RegisterTermsAndConditionsRoutes.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\RegisterTermsAndConditionsRoutes.js
      MD5: 71a538ae0a980458e198a679fc35b2d2
      SHA1: e905823010a99c7105fed6f8f942d0ff508db05e
      SHA256:bbc9ed7a0a56b4ae9e4f4409342015798167b4dcad9f9e6d5cde245660a078a5

      Identifiers

      • None

      RegisterUrlRoutes.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\RegisterUrlRoutes.js
      MD5: bb08b0de6f7b13dfc2b308e926adee22
      SHA1: da7865f12249d2d7cc95e025fda922059713844e
      SHA256:a942b0ffcf5523acd5b6f8a7507f5d5d9eee81a04b15ccf0cf66f744ca1fd2b7

      Identifiers

      • None

      Reseller.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\model\Reseller.js
      MD5: 9bfed6404d3875b7d31cbf3eac3b7685
      SHA1: 800174b4d3153cb71b0b34c8130180743e356ecd
      SHA256:9ae3119c012701d5dd2ecf2f40e882e9ed77e2ff4845940c3a511de55e30fbc0

      Identifiers

      • None

      ResellerHandler.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\ResellerHandler.js
      MD5: 472509d30e26faaa6ef805e5f2fdeded
      SHA1: f3ec70d3f1b52db66a739a3b97cd400c70e2e833
      SHA256:d0fd4e71f786c1abe075a05c677ff33f7c760d0420c12598f42cce3e01e88eb4

      Identifiers

      • None

      ResellerRepository.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\repositories\ResellerRepository.js
      MD5: 5c5db7408aa985711984fba2283fd6f1
      SHA1: bbbbf52bed746a52ae437a95c4309a6b38328122
      SHA256:65b6b2ef7408b53fef33690862a759195babbc33aff72e867879481c26d38ee7

      Identifiers

      • None

      SQLitePCLRaw.core.dll

      Description:

      SQLitePCLRaw.core
      
      SQLitePCLRaw is a Portable Class Library (PCL) for low-level (raw) access to SQLite

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\SQLitePCLRaw.core.dll
      MD5: 358bf09045a59a1b85acd9bc0a592904
      SHA1: 53cf59d7b192f570d528b4d5c72dfa7ac25e1d7b
      SHA256:6be5d612830990f4185dea66b4baabe191d641a3a97e081a2f62fbadf2af5b0f

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      SQLitePCLRaw.provider.e_sqlite3.dll

      Description:

      SQLitePCLRaw.provider.e_sqlite3
      
      SQLitePCLRaw is a Portable Class Library (PCL) for low-level (raw) access to SQLite

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\SQLitePCLRaw.provider.e_sqlite3.dll
      MD5: 15aa5f7d13d358d33d67cafdd13dc768
      SHA1: a071a6c2b291969ae0d182172593bba2b9b0ac84
      SHA256:563a17c67cab6f660779a76c9f960afe444062560d82fe638d15113566eea4a8

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      SSMParameters.js

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\config\SSMParameters.js
      MD5: 8b3214a0c09ca95f8062e068f6c14c63
      SHA1: a5761970d8338ce56aa20412684fa9e731a0113b
      SHA256:f295f888b0dee1024aa570d07329b6f4a3cfc96f6b85f4fd25c5c1aa8472b29d

      Identifiers

      • None

      SSMParameters.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\config\SSMParameters.js
      MD5: 277c3336423e01eef6991c5a49e12a54
      SHA1: dc984a233de2dde031ae363847f3771bc6516f25
      SHA256:97fc472a7b5cd4e4cb606f6dee13951e4ae044a408b7591ecb614fd99ff5e05f

      Identifiers

      • None

      SSMParameters.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\config\SSMParameters.js
      MD5: 5db5fc577c374ff7857fa7ee37fa5927
      SHA1: 1d86de094b14261d26e0ceeff55b9861da30d060
      SHA256:3050d8cbd2f3270ffec2921b539a657e4c43574a69f274059f82d7082fa93c8e

      Identifiers

      • None

      SSMParameters.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\config\SSMParameters.js
      MD5: fe9cca30541b1eb0c91e11299f64d437
      SHA1: f65f35a3d9ebe86c86e0f4ec93da550488b7f15f
      SHA256:9c2e593141707ed4b5de92d0e7ea2d8eb39b373ed20d0bc3d3a1071b9b233f56

      Identifiers

      • None

      SSMParameters.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\config\SSMParameters.js
      MD5: 3a6e15d408d68089a458ae09f00d9b3f
      SHA1: b7923dc9454cab5045fd20fd7b4a3b1e4c036885
      SHA256:e1dcb979f30af065bd2d099030c9dcb4bc9d223242cb3d733ef718c4535a0bc9

      Identifiers

      • None

      StatesSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\StatesSwagger.js
      MD5: e3bd171a1e84ff2e008791ca5025d37b
      SHA1: 747ec62c85c57619d52b18ec226b2c0937a98125
      SHA256:990252cf3703f6ab9657f460599b75cf99d2c1f43631ee06c1d4cfc66aa3a4ef

      Identifiers

      • None

      SubEntityType.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\SubEntityType.js
      MD5: db1a5f34cfc1bf153d3a7fdc9767d1d8
      SHA1: a0c575b9c7d5b9bbb1342486ea2cbff9f34325b4
      SHA256:b25e935d56461161e808a416c14fcf3b3b80f5661820457d2f345a091b63b2c5

      Identifiers

      • None

      SwaggerController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\controller\SwaggerController.js
      MD5: bd22f02068508734e8ca04e0e030ff5e
      SHA1: d99dc39625a702d398367076e4641f8a2c703033
      SHA256:5a2f5df1562b069c721448edaf998971a04f773dcca85b2027b2cbdd44df401e

      Identifiers

      • None

      System.IdentityModel.Tokens.Jwt.dll

      Description:

      System.IdentityModel.Tokens.Jwt
      
      Includes types that provide support for creating, serializing and validating JSON Web Tokens.

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\System.IdentityModel.Tokens.Jwt.dll
      MD5: beb053ced12524cd30929c39fe042c47
      SHA1: 921e59d904d6c8e2bad5feb738c01798a83acd6f
      SHA256:64ecbb6c584d9b3394ce519ee75adee80d4ab54ffebaaa8423a08f105b34c9ee

      Identifiers

      • pkg:generic/System.IdentityModel.Tokens.Jwt@5.6.0.61018  (Confidence:Medium)
      • cpe:2.3:a:identitymodel_project:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
      • cpe:2.3:a:microsoft:identity_model:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  
      • cpe:2.3:a:microsoft:identitymodel:5.6.0.61018:*:*:*:*:*:*:*  (Confidence:Low)  

      CVE-2024-21319  

      Microsoft Identity Denial of service vulnerability
      CWE-20 Improper Input Validation, NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (6.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H/E:2.3/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      System.IdentityModel.Tokens.Jwt:5.6.0

      File Path: D:\Auropayrepos\Masters\src\Masters\Masters.csproj

      Identifiers

      CVE-2024-21319 (OSSINDEX)  

      Microsoft Identity Denial of service vulnerability
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (6.800000190734863)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H

      References:

      Vulnerable Software & Versions (OSSINDEX):

      • cpe:2.3:a:*:System.IdentityModel.Tokens.Jwt:5.6.0:*:*:*:*:*:*:*

      System.Security.Cryptography.Xml.dll

      Description:

      System.Security.Cryptography.Xml
      
      System.Security.Cryptography.Xml

      File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\System.Security.Cryptography.Xml.dll
      MD5: f94303ed2487aa66fae8a3c08ff8240c
      SHA1: 5a95de9f2293e3b2438c061312aa298db5e9f0e5
      SHA256:805a9fe21eb53635a6696ca5d319e5b13e399991e3c4e3f6084ce9b85a2c4ffb

      Identifiers

      System.Xml.XPath.XmlDocument.dll

      Description:

      System.Xml.XPath.XmlDocument
      
      System.Xml.XPath.XmlDocument

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\System.Xml.XPath.XmlDocument.dll
      MD5: 176e9b8e9b622a51e5b3db8d0fac6eea
      SHA1: 5354245e852fdc31019f6496c1b7cae056b471ff
      SHA256:f95c1bd1cf19ef02b788a3473ccc64716d26504d98831ddcb240f1d913a3eef3

      Identifiers

      SystemInfoRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\repositories\config\SystemInfoRepository.js
      MD5: c1b84224571117ddddec0c252a03ce06
      SHA1: 9a7a6ba0c0764f097136976d4acb2b8a50b46266
      SHA256:102746862c9520db3b15fe3b04eef18a7bd8541ded1bc6abcfe7b3b40a5e46cc

      Identifiers

      • None

      Tax.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\model\Tax.js
      MD5: 53a2133aee8244903401161b581f22b4
      SHA1: 52536d8c64a4dd82c000d55578a0d0379eec7906
      SHA256:0334d87d46234edd922cbda94917ae62f41c558e86cf404e85d029925b576647

      Identifiers

      • None

      TaxAssembler.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\assembler\TaxAssembler.js
      MD5: 035e8fc58636622fabe16361fcaee243
      SHA1: 23a90f8d38b87a143635c9f35e0aae018c0a1ed8
      SHA256:8093973ce1e64c5ac7aa9543eebcd7d5fafe86764f42ae5468fbd4ae0c4fb32c

      Identifiers

      • None

      TaxCalculationSrvice.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\fee\services\TaxCalculationSrvice.js
      MD5: 34bb125b1e7162bff2d11d841518c446
      SHA1: 4767e6abab3f70a8c63412dbfa7a6dea917b0ed4
      SHA256:597c41eb96818096d9dcd16f5186f0f6c4a3d1cd25c5aa9158c81004a2c04b5b

      Identifiers

      • None

      TaxConfigurationValidationMessage.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TaxConfigurationValidationMessage.js
      MD5: 4983bc7c4e3308fe784002c247a5fe02
      SHA1: c0d013f1256912ee86709ee2f5a82e7bdfbfaa06
      SHA256:3c2db3e236889c75f5069351953ea14c15367be98cd2c4b418d25dc8ecd65fb9

      Identifiers

      • None

      TaxController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\controllers\TaxController.js
      MD5: d5d4dbbf197e68be97b57e17e61fa5ad
      SHA1: b28b545403b856e1d6dad124d667feb5cf1aa2c9
      SHA256:a2394a20d9fd9db36636cb6a4d930bb2eadb1ea2067516ed8bf00efc04edc292

      Identifiers

      • None

      TaxRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\repositories\TaxRepository.js
      MD5: 064cd152220ca5fe582c4c2fda5bfdba
      SHA1: 8705715c83c79b2a689aa7824effdf2130855f0e
      SHA256:33e3f7bde47d4ff6cf5162ac2e478715a35c876d4cb9580035886daa254ee953

      Identifiers

      • None

      TaxServices.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\tax\services\TaxServices.js
      MD5: 52852e1bee19ed783f45b051a8fba3e6
      SHA1: 55a9262b1cda2424f7faac1398f17ec91d52bdf7
      SHA256:cb1e95d97d469cf7a04db4d1e0cd1659d9b36b8a26c7436e972c3cc3feb35f81

      Identifiers

      • None

      TaxSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TaxSwagger.js
      MD5: a39c8dbaacbd65e4f8abae0a9c6452be
      SHA1: f200103c3a8f117b59f62737f29639c3fe1b1d90
      SHA256:90736e17283354f9a570fa901e5c3392179293b33d16eb6b5c70bd8f964ab427

      Identifiers

      • None

      TaxType.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\TaxType.js
      MD5: 8058f627355f18c0e02f02851ca44805
      SHA1: d08f7e6c1bf1de1145017914dd73eaa9bf9bdfc3
      SHA256:0d7e304f9a4299397c6f78806417cc9ee7e13316df094d1f749a360e5db5aa99

      Identifiers

      • None

      TermConfigurationValidationMessage.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermConfigurationValidationMessage.js
      MD5: ad932f116a2109ec3e54557b68612443
      SHA1: 36ab960249f35484744a152fb1b47d706b1c5eef
      SHA256:ab7a70664e0641de11c8c14219ad65f4d05e0296a9d89adc8cc67977afaaa3bd

      Identifiers

      • None

      TermsAcceptance.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAcceptance.js
      MD5: 1140e44697cb28b8a06b7d129cb90fb3
      SHA1: 1808657e4a5cbb2d964e62d459fbd5148a4b5824
      SHA256:51243693334e45ecaa56fcec0a6709a822645037e233f537438b718e8e9dce7f

      Identifiers

      • None

      TermsAcceptance.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\TermsAcceptance.js
      MD5: ca1a8b59cd0b0e4094ca6d08e3d3bee3
      SHA1: 71846bef96abded0024acace667f18d64de25818
      SHA256:c330116cba706b0bc55c7d57a781a49ea9f11f4ed66b69303ddb118130f5df97

      Identifiers

      • None

      TermsAcceptanceAssembler.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\assembler\TermsAcceptanceAssembler.js
      MD5: 46161154d67c2c4f5dc279a76837b839
      SHA1: 5db1fb71a08362a8a0e122d3a266c5338d36fdee
      SHA256:846dff58a837ac1182502a75f05ad1288d497b05ae31b5134e38096b5f592dd8

      Identifiers

      • None

      TermsAcceptanceController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAcceptanceController.js
      MD5: 64c63de69de89ebb89fde82e7f14d9e4
      SHA1: f1a80604900ac8721602886e1cb46c6224604b4a
      SHA256:64b3a32416946c7faf8f7cd2a96872c61d975e1df84c2d156f0cbc6f9380096a

      Identifiers

      • None

      TermsAcceptanceRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\repositories\TermsAcceptanceRepository.js
      MD5: c59ec4d6c639c0d7f9b4970b21d07be4
      SHA1: 5957709a4555a4a66157ff55bc971897428314a4
      SHA256:180abd99a7c5d468f608a526617f6eae942f4675a810340a3f130e16fe6bc4ab

      Identifiers

      • None

      TermsAcceptanceRepository.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\repositories\TermsAcceptanceRepository.js
      MD5: 53e779ec5bed0e515d278c45f9ffab02
      SHA1: efd5b8340c9bf677b3d7c803c6ac31b653815e02
      SHA256:ca9153e4c73cf6524526e5a9483fc3844b6588bb0de8d96a058d1c0f64bb0c35

      Identifiers

      • None

      TermsAcceptanceService.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAcceptanceService.js
      MD5: fee46de2b8cca90e6ee8643a3e3a4383
      SHA1: bf8841ad78671371d8aa446cec7755f10e0db2f4
      SHA256:fea37a405b17ce028bfc7cfbab6bb4f01c0fb8b607915743264302b78e284734

      Identifiers

      • None

      TermsAcceptanceSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAcceptanceSwagger.js
      MD5: b6f7470623140ffa83f94bee91c92796
      SHA1: 08461754bf5e9690027eda84f83d14c54b7d80cc
      SHA256:9a7116397eab97049aab54dc3ec02da5386e092e31dd9910acba65b338961a6f

      Identifiers

      • None

      TermsAcceptanceValidationMessages.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermsAcceptanceValidationMessages.js
      MD5: 7b8207c87b76c3d5309a8e91fe7f8e9f
      SHA1: 6e890f5737fd5be279590c8788f2264b716a99fe
      SHA256:ea538b6a800c1794b852db9e85e8b0422eec8f97ab6bd43838d0cd9b571742d2

      Identifiers

      • None

      TermsAndConditionHandler.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\TermsAndConditionHandler.js
      MD5: 6efd48217964cad8c2eaa0c2c17ff1f3
      SHA1: 70e028360dee2c390c1d25b9b895870720b9f370
      SHA256:113894cd6b8bd3b41f3e3ff68d025178b62f08765de3bbdde02d4aeba1f52d25

      Identifiers

      • None

      TermsAndConditions.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAndConditions.js
      MD5: dddea7f4c1f4b2462d82c7091469cb82
      SHA1: bcedb5f9910cc5be50d435857815c7b9fd06b1b9
      SHA256:7835854cb993b29bf6a38cec16eca92f65b227df5c58914db604e1470ae16137

      Identifiers

      • None

      TermsAndConditions.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\model\TermsAndConditions.js
      MD5: 2fda34450d64990432c875dd80128add
      SHA1: 2dceacabec927093bf458f1110aacd337c373878
      SHA256:d8ec17795871ee5a7cbc78c6470ed546844e2d0d99b97603a5dd2a4e858df267

      Identifiers

      • None

      TermsAndConditions.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\model\TermsAndConditions.js
      MD5: fc3b1bc533f81523e5c7dc5f38d3bc86
      SHA1: 1fdd912141413a844c6c82f915eb1c93565f6d06
      SHA256:26f6d3bbbb646eb7541673dc14bcb8e2d274a512b0a5944da0754a7117846053

      Identifiers

      • None

      TermsAndConditionsAssembler.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\assembler\TermsAndConditionsAssembler.js
      MD5: 908ce906dd28d4c6042d5944219fe194
      SHA1: 94ed444cf4260d233320c0949e215608cfa69386
      SHA256:1ae834639d353cad49d7f86f0e9cd7c7f072ca108f7fdcb7303f529a1a3d875f

      Identifiers

      • None

      TermsAndConditionsController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAndConditionsController.js
      MD5: de7cea82d7ff3c990982cb616648f810
      SHA1: 6aa65cd88772c3958433c6a74c52307f618a1a09
      SHA256:dd53cb8320a50ceb84c8061f73d6c3f53649c6126e6a65ac5d942a2abfa1bb7b

      Identifiers

      • None

      TermsAndConditionsDocument.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\model\TermsAndConditionsDocument.js
      MD5: 0533d0b17b6eec7b819f7b0423a66da9
      SHA1: f0d5ffdc424fa3e6c5291f88845c6d9a0050aeab
      SHA256:ebc76989983b9c26a442be61e6c4201abd11f70dfc9bf966419194e8daf6032a

      Identifiers

      • None

      TermsAndConditionsDocumentController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\controllers\TermsAndConditionsDocumentController.js
      MD5: 4a7a10d5854b2ac893e1a454f720fd22
      SHA1: 3de8dd7413b70a6d0d2026c68324d4eb9aaeaa91
      SHA256:0ed1e8e5c547c590cf879d87ab402b6cfa8006f81512a01ce4b1e246133a08b4

      Identifiers

      • None

      TermsAndConditionsDocumentSchema.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\TermsAndConditionsDocumentSchema.js
      MD5: 4ecfa7412eb4fe8c491792f113506281
      SHA1: 6caa78bac338929e1fe20a1ea78f38ef5abb4502
      SHA256:610ee4a8a3d3f5f4e0824ee663ea643f55e39b8f94b6c6a23676b93a9ff54962

      Identifiers

      • None

      TermsAndConditionsDocumentService.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAndConditionsDocumentService.js
      MD5: 872532af7c66ca4281cecca68a2e95bc
      SHA1: 75dfbae7d0dde3cc9a20ffd289b3273aae16dca2
      SHA256:053276137d2210298db043b814198b4160f29225185d9f7e3c6060f190a36561

      Identifiers

      • None

      TermsAndConditionsDocumentSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAndConditionsDocumentSwagger.js
      MD5: 2f90694af8484b0c97a7fdecddd90a7b
      SHA1: b5b8fecdbdabf89bb5e777a9fef99c48c4c4b3f5
      SHA256:9455579cdb678ee8363bb2eb9cd2afc1e0eeca293416995c9f68af836130f60b

      Identifiers

      • None

      TermsAndConditionsDocumentValidationMessages.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\TermsAndConditionsDocumentValidationMessages.js
      MD5: 5911be6a219623c2d7076ef593b7a314
      SHA1: 4cd2c2239817710eafc583556fb7a5a8f4a6f9d2
      SHA256:26193d42c7dc4475679b971ad639b7ff68ecb66950025af288ca473637fd713e

      Identifiers

      • None

      TermsAndConditionsRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\repositories\TermsAndConditionsRepository.js
      MD5: bf6dbde685d7ba07372b07b55211fd4d
      SHA1: bc383cc284231f316e7fa194dd64846ab34d14d5
      SHA256:83d3031b3fe765a0b5d7baf57d5c4a42eb54423ea743432861af5ae5d4a23a3b

      Identifiers

      • None

      TermsAndConditionsRepository.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\repositories\TermsAndConditionsRepository.js
      MD5: ce4f7b1d5b65979e69d872aafec2dcfd
      SHA1: c5f574886bf472c587d5a8193e4e9c4ad4e77dd9
      SHA256:d8eb8cdfecf983fa9ec3f8d6dde4c463f482c999eb699cf0b60abcc74c141a2b

      Identifiers

      • None

      TermsAndConditionsRepository.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\repositories\TermsAndConditionsRepository.js
      MD5: bb7de7f82683934e91738e68e84aa9d7
      SHA1: dabf2c01bef31f1d0556eee3f73154b723124295
      SHA256:437f5e5ac205013a5910c7249e9510ff6e6099e1e8ed335ddae3bede377576b3

      Identifiers

      • None

      TermsAndConditionsRepository.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\repositories\TermsAndConditionsRepository.js
      MD5: 234b94ed6d0586ce96c45e5da5e970cd
      SHA1: c5069cddd1a4bc706f85fd9d547b8eb6a01752e3
      SHA256:34fc383b7c95dad7373543921b787c592dd61c9dc8430469d324e45988798837

      Identifiers

      • None

      TermsAndConditionsSchema.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\schemas\TermsAndConditionsSchema.js
      MD5: d43e13e950b42607d96b734a46cf0312
      SHA1: 9136a6674687bd2c68a1d26f04289069e61b0848
      SHA256:aaf0d0a278d89f1dab1b53f232129c86feec4366123d79bf850c648196eaff64

      Identifiers

      • None

      TermsAndConditionsServices.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\termsandconditions\services\TermsAndConditionsServices.js
      MD5: eb1d7c4d2df28f43822f52bc4f7b402d
      SHA1: ef8c1fd977adb33214dfdcfd655e7c5299dec39b
      SHA256:2343e4a3e015817f7f35d32d00dbbac38aa565c7ef06bdc4fd852eb31e813062

      Identifiers

      • None

      TermsAndConditionsStatus.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\TermsAndConditionsStatus.js
      MD5: aa01557dfc6a744884f1ad00ecec69a4
      SHA1: 298ced3904f81e0b6bbb6d64adc9a06fa33bb189
      SHA256:8eeca301bd7f1587f517b08ad8853f811b1dc9fc9dc0a54979701bb17a85a550

      Identifiers

      • None

      TermsAndConditionsSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TermsAndConditionsSwagger.js
      MD5: c6771285d9882995e12ccf535fcceb08
      SHA1: 3f82ea241d18b3824d5f2302b1bfe7a4c20de442
      SHA256:75a40f0be814cf7aaae0194481b673e69a5aaef2914fd028559593f8d15467fe

      Identifiers

      • None

      TermsType.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\TermsType.js
      MD5: 94cea1e65b5e751727adf342d40d9652
      SHA1: 4663ec1db2c091423ca82265445c97120ea9773a
      SHA256:839a4fc9de726c2d5b8f89e5f1525e67644cf97ff1b5dc33b4b9249dbf2651ef

      Identifiers

      • None

      TestApiWebhookSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\TestApiWebhookSwagger.js
      MD5: c8ee6a10d1b96add643b14ee2058a5fd
      SHA1: f731080397708f8d82a83679e560307f50dad60d
      SHA256:ff21bd1dcc419db0b93272d6c4d3a5eb28e15a59a9ae683cf798d3922e96e0db

      Identifiers

      • None

      TimeZone.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\constants\TimeZone.js
      MD5: 2ffe1905d3b123e6e67e17c9edb8ab6c
      SHA1: b02fcd951321ca9a7bb45a03ba9a9bef27664d09
      SHA256:5dc79c964f67a6212483b54c89991ea8d3d74070232656112189bced1469b961

      Identifiers

      • None

      UrlShortener.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\models\UrlShortener.js
      MD5: d285734e8f81aa0ecde3828f7490ae4a
      SHA1: 90670abb49051374ccb5378c92343e943f729fe3
      SHA256:8c8f8d8d02f70eb90362965981f13be9aac64edad8da422f02e2d41fed8dafd8

      Identifiers

      • None

      UrlShortenerController.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\controllers\UrlShortenerController.js
      MD5: 7397697c07c20c0190cc5d6ea90a8c80
      SHA1: dc503d5b8d3811be9c9d4f35542a61eeef396091
      SHA256:2d958cbccf5bba4121def19749e3f651347522e54a2c8be4bb2837837e68b8ee

      Identifiers

      • None

      UrlShortenerRepository.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\repositories\UrlShortenerRepository.js
      MD5: 7aa0f647fab15c87701d46fbe0d3578b
      SHA1: 34825bf57348639eba18958f2295e1b980083bcc
      SHA256:87629563dd52e6f606501b6a27546169e7353e076e3608075f38a6be0ae1873a

      Identifiers

      • None

      UrlShortenerSchema.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\schemas\UrlShortenerSchema.js
      MD5: f289af3cea2237cc42a1d2bd63e42647
      SHA1: 40b2a6b692831a2d33c0bf4d0ebc202fcc5eae1f
      SHA256:f4084844a19d1ba41162de58f38f728ee55f26da964609986e9a834432e842ba

      Identifiers

      • None

      UrlShortenerService.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\urlshortener\services\UrlShortenerService.js
      MD5: e674e57e74cfb45f5f2cb07b8dcd94e6
      SHA1: 9bc1a6ec5cb6063bf559990a12e4bc7851a90a2e
      SHA256:94766c7e9950b2767974ba0dbea6011e01ed6f2caddd074b230267f14fedcf8a

      Identifiers

      • None

      UrlShortenerSwagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\UrlShortenerSwagger.js
      MD5: 782d73f553897d749a7b07c883ec10ec
      SHA1: 9ae07a985473090907c4e538dd7150abb67cc564
      SHA256:a2e4a005f6b8f2876743b2545bc1e87a07009048d75be6a0bc7a33eb7d89eeca

      Identifiers

      • None

      UrlShortenerValidationMessages.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\messages\UrlShortenerValidationMessages.js
      MD5: b866050cb193ab82ca9bcdb78baab79f
      SHA1: a62400e53c0ba03f1813c9a5595495168c6103ea
      SHA256:47f357b9a8a1d21bfb6c3890dd8495a41b231553d6a5243c83246bb200d2a2da

      Identifiers

      • None

      UserType.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\constants\UserType.js
      MD5: aac81810577b68a53de55fa9e1f309f6
      SHA1: 421291b3f968320d1852e2732eabe5118219c52b
      SHA256:772f0c7149652fa2489fb831edb6ef1f631cbaf8b2f89c70c64e620faeabcdba

      Identifiers

      • None

      WebhookEventHandler.Tests.csproj

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj
      MD5: 3dc7812cb6d48b0ad78f91529847db4f
      SHA1: 98645c01131de1e087e115ad127e69d4bc282f15
      SHA256:0d1e21e66de017bd483aaccdeeded917f688004876290b279f96bc9ba3850e4e

      Identifiers

      • None

      WebhookEventHandler.Tests.dll

      Description:

      WebhookEventHandler.Tests

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\WebhookEventHandler.Tests.dll
      MD5: ac855fcf4da450793ca87d4e09768fae
      SHA1: 6b52cacbae25a1eb12a9e23e48c9bc08734d1a65
      SHA256:3200c6ad3723111146403a59a5497d1e758f1d8478c1a57d4261c2b16357fc06

      Identifiers

      WebhookEventHandler.csproj

      File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\WebhookEventHandler.csproj
      MD5: 55587d88b88b4ffeb4d477504db3d9fe
      SHA1: 99761575b1a922ee789157ade697859a8d2ec3d1
      SHA256:846a5de691bfa96e038af2b7e653155d8651f011ce8315b6d12e55b6fc491ce1

      Identifiers

      • None

      WebhookEventHandler.dll

      Description:

      WebhookEventHandler

      File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\WebhookEventHandler.dll
      MD5: 989430e3234d29f17e792a6f0fb4273a
      SHA1: 9d5619d51fb10bac42245135bdb0221f62040d82
      SHA256:2a8be66e6a44857253c2f5e7aab8ce543a1a75c4cc36793453f8e5833bbf4908

      Identifiers

      WebhookEvents.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\definitions\WebhookEvents.js
      MD5: d2cf1fa64dd01d4cae1c53a0f25d300e
      SHA1: a1545c1208ba2d7b566d79f26008b4040807d3d4
      SHA256:22207d9c7ad41ce4a47703cf74dc769604ef7f21c1d4ce2e7d1083ec9c344cba

      Identifiers

      • None

      allowedProcessMethodRepository.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\allowedProcessMethodRepository.js
      MD5: fb96405f2f63b1fb6ad6c6e80bc07aba
      SHA1: c45ab65aac08e9c6fcc5cf5bc39ce2b07e13a7de
      SHA256:e74a8a8e64cdf0221941daae7c386a6099a9427826fff3bccf06d9a50c71eedf

      Identifiers

      • None

      app.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\app.js
      MD5: 83764dd32a9e4cce995442a801fdc7fe
      SHA1: ff61630b9220f03174e1320f684d6a39c98bd41e
      SHA256:e74de97aeca4777bdfa39a789a5052f6868ee79c412105970207094d8216db5c

      Identifiers

      • None

      core3.1.api.dll

      Description:

      core3.1.api

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.api.dll
      MD5: fbf39c4a4df7fc493a01034170edf849
      SHA1: ad7cbd474587e55c313aa54f2cb7d254e77783c3
      SHA256:04ef122a557541705a24beaaf8b22ca018acb01a989d5bac21a340b7e8470720

      Identifiers

      core3.1.aws.dll

      Description:

      core3.1.aws

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.aws.dll
      MD5: 3c0c3fa76810f32f412dde3e45fd7e1f
      SHA1: e083763287a1965426d9fb3f0d6822a76a9ed4f5
      SHA256:438003ced71775aee65617faf6c425b704b26e4712283bf7038abf58b6604078

      Identifiers

      core3.1.dll

      Description:

      core3.1

      File Path: D:\Auropayrepos\Masters\src\Masters.API\bin\Debug\net6.0\core3.1.dll
      MD5: 82fa5d78308c8b00fb74276048e6386a
      SHA1: 57e57ebb6b6dd0c62827d869e5d61ab981b622d6
      SHA256:fb3b161b7c5da0e7ee602b400371964a0e5e11855bd0bbc11387e4cc1915918f

      Identifiers

      core3.1.dll

      Description:

      core3.1

      File Path: D:\Auropayrepos\Masters\src\WebhookEventHandler\bin\Debug\net6.0\core3.1.dll
      MD5: adf76eabc0cbb7253f0b0300da50ddfe
      SHA1: 10bcca71648dae26f3d9930215c55ec84d35dc73
      SHA256:fecaef540c399b8446ffaf7f244ccfef7c6c5c19cd4836f4365f936c0fa81cd2

      Identifiers

      coverlet.collector:1.2.0

      File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\Masters.API.Tests.csproj

      Identifiers

      database.js

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\db\database.js
      MD5: 6011964e01cf6d6d90d7a3b4c8c74fda
      SHA1: 279acbec98b514d1366d6aeb2568a46c484bce61
      SHA256:da1b703d25214c68a6bcda3f66c3e37a58556bed40bef488ee88e5a4c7b3ff6d

      Identifiers

      • None

      database.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\database.js
      MD5: 14008e4d451995a9b7e9cf0bf7a47e5b
      SHA1: 205bf5f6c0fdc17a609ba6f4d7765911fc88757a
      SHA256:fc7a9ce5074a74c1ec2ff59cba8012fafd3287a3039cd585020ca474de8b74ef

      Identifiers

      • None

      database.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\db\database.js
      MD5: 2f3d9983a534c97d1ede297f5adb7e59
      SHA1: 2b077b0a66f5b9fa9e1c9910c78afe4d1b7944ff
      SHA256:8deea7599a27450842a910ff94ecfbb277797c21f471fe305f4eac4a5ca3d4a6

      Identifiers

      • None

      database.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\db\database.js
      MD5: 4a33fab811daa9cb2f23d9eaca54174a
      SHA1: 27ff9afe31cfb7a340b91d586b5627f69e033699
      SHA256:e2b7316b66267d61fca4e273fabf6b1f9e3399c1cfa39ca6f5d60c631c97860e

      Identifiers

      • None

      e_sqlite3.dll

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-arm64\native\e_sqlite3.dll
      MD5: 87776aa83dd0b7c7c0d107086019e23c
      SHA1: d23e9a5e7faf8ab63304650ee427536c814cbbdf
      SHA256:7be069b83dbd374867b6e4384b359e108e91518f7a74553ddd31b053921ab42b

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      e_sqlite3.dll

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-arm\native\e_sqlite3.dll
      MD5: 5dd768fd40b38f44e16e898b52ab6635
      SHA1: 987c6c9dfee3ad5a983298cb2c01372870610e62
      SHA256:618ae75967acf2053fde3c74b2d96c4e6c097675c3a725ebc5605521df296fbc

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      e_sqlite3.dll

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-x64\native\e_sqlite3.dll
      MD5: 6ea08a0e0affdeab1889e153402b97e2
      SHA1: 8e05d4e52f42b34c485f1c8ac7ce8b0304053f7f
      SHA256:29029877dce20e985487b1805733d72e0962e6a5cb72796b52a52628aed085d5

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      e_sqlite3.dll

      File Path: D:\Auropayrepos\Masters\test\Masters.Tests\bin\Debug\net6.0\runtimes\win-x86\native\e_sqlite3.dll
      MD5: 03a62e86903e0c125a4f190be476c674
      SHA1: 9f8ee1eefd87584649447f4fcb1699098e2d6496
      SHA256:d2e0558e63ac31bd4ed01e4db7107812808b17c0223455c00482f631c0b43339

      Identifiers

      CVE-2017-10989  

      The getNodeSize function in ext/rtree/rtree.c in SQLite through 3.19.3, as used in GDAL and other products, mishandles undersized RTree blobs in a crafted database, leading to a heap-based buffer over-read or possibly unspecified other impact.
      CWE-125 Out-of-bounds Read

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19646  

      pragma.c in SQLite through 3.30.1 mishandles NOT NULL in an integrity_check PRAGMA command in certain cases of generated columns.
      CWE-754 Improper Check for Unusual or Exceptional Conditions

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-11656  

      In SQLite through 3.31.1, the ALTER TABLE implementation has a use-after-free, as demonstrated by an ORDER BY clause that belongs to a compound SELECT statement.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: CRITICAL (9.8)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-5895  

      Multiple unspecified vulnerabilities in SQLite before 3.8.10.2, as used in Apple iOS before 9, have unknown impact and attack vectors.
      NVD-CWE-noinfo

      CVSSv2:
      • Base Score: HIGH (10.0)
      • Vector: /AV:N/AC:L/Au:N/C:C/I:C/A:C

      References:

      Vulnerable Software & Versions:

      CVE-2018-20346  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries that occur after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases), aka Magellan.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-20506  

      SQLite before 3.25.3, when the FTS3 extension is enabled, encounters an integer overflow (and resultant buffer overflow) for FTS3 queries in a "merge" operation that occurs after crafted changes to FTS3 shadow tables, allowing remote attackers to execute arbitrary code by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases). This is a different vulnerability than CVE-2018-20346.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: HIGH (8.1)
      • Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:2.2/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3414  

      SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
      CWE-908 Use of Uninitialized Resource

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3415  

      The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
      CWE-404 Improper Resource Shutdown or Release

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3416  

      The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
      CWE-190 Integer Overflow or Wraparound

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-3717  

      Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
      CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

      CVSSv2:
      • Base Score: HIGH (7.5)
      • Vector: /AV:N/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2018-20505  

      SQLite 3.25.2, when queries are run on a table with a malformed PRIMARY KEY, allows remote attackers to cause a denial of service (application crash) by leveraging the ability to run arbitrary SQL statements (such as in certain WebSQL use cases).
      CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2018-8740  

      In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-11655  

      SQLite through 3.31.1 allows attackers to cause a denial of service (segmentation fault) via a malformed window-function query because the AggInfo object's initialization is mishandled.
      CWE-665 Improper Initialization

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.0)
      • Vector: /AV:N/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2022-35737  

      SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
      CWE-129 Improper Validation of Array Index

      CVSSv3:
      • Base Score: HIGH (7.5)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:3.9/RC:R/MAV:A

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2023-7104  

      A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer, CWE-122 Heap-based Buffer Overflow

      CVSSv3:
      • Base Score: HIGH (7.3)
      • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:3.9/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (5.2)
      • Vector: /AV:A/AC:L/Au:S/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13630  

      ext/fts3/fts3.c in SQLite before 3.32.0 has a use-after-free in fts3EvalNextRow, related to the snippet feature.
      CWE-416 Use After Free

      CVSSv3:
      • Base Score: HIGH (7.0)
      • Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:1.0/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.4)
      • Vector: /AV:L/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2015-6607  

      SQLite before 3.8.9, as used in Android before 5.1.1 LMY48T, allows attackers to gain privileges via a crafted application, aka internal bug 20099586.
      CWE-264 Permissions, Privileges, and Access Controls

      CVSSv2:
      • Base Score: MEDIUM (6.8)
      • Vector: /AV:N/AC:M/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2016-6153  

      os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
      CWE-20 Improper Input Validation

      CVSSv3:
      • Base Score: MEDIUM (5.9)
      • Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:2.5/RC:R/MAV:A
      CVSSv2:
      • Base Score: MEDIUM (4.6)
      • Vector: /AV:L/AC:L/Au:N/C:P/I:P/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2019-19645  

      alter.c in SQLite through 3.30.1 allows attackers to trigger infinite recursion via certain types of self-referential views in conjunction with ALTER TABLE statements.
      CWE-674 Uncontrolled Recursion

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13434  

      SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.
      CWE-190 Integer Overflow or Wraparound

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13435  

      SQLite through 3.32.0 has a segmentation fault in sqlite3ExprCodeTarget in expr.c.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions:

      CVE-2020-13631  

      SQLite before 3.32.0 allows a virtual table to be renamed to the name of one of its shadow tables, related to alter.c and build.c.
      NVD-CWE-noinfo

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:P/A:N

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-13632  

      ext/fts3/fts3_snippet.c in SQLite before 3.32.0 has a NULL pointer dereference via a crafted matchinfo() query.
      CWE-476 NULL Pointer Dereference

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      CVE-2020-15358  

      In SQLite before 3.32.3, select.c mishandles query-flattener optimization, leading to a multiSelectOrderBy heap overflow because of misuse of transitive properties for constant propagation.
      CWE-787 Out-of-bounds Write

      CVSSv3:
      • Base Score: MEDIUM (5.5)
      • Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:1.8/RC:R/MAV:A
      CVSSv2:
      • Base Score: LOW (2.1)
      • Vector: /AV:L/AC:L/Au:N/C:N/I:N/A:P

      References:

      Vulnerable Software & Versions: (show all)

      enumHelper.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\commons\enumHelper.js
      MD5: 54e74d48a3a86a3847ad42f9185dcb7f
      SHA1: f295664633c18d37c12c7cf95d242b4a86cf5211
      SHA256:24f12d32b7835a7fb714bb48bbfe057c17439d390d50d1e6414aa898b2dd1cc3

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\index.js
      MD5: b409ea6455d8dd8a0887db667bee9e7d
      SHA1: b7a67013e7364a1f79d9ff8a9035f86da77f685e
      SHA256:a7910bc72eb7c11abdf36937f765f52af1ec42017aa47bf331866afe76ba9b20

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\index.js
      MD5: 75d2c932dacfdf14add52a46a1c767fc
      SHA1: 996e08c11e4ef9e63440e856c0bff404ad3bf0be
      SHA256:ed9e29926530c57624033907c819d92170d08d54f9d3efdd6d2046da34ec9e22

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\index.js
      MD5: 2315a4178319af3808c4e269f1498d29
      SHA1: 236e1a21e94fcedb2b9beee99a3c828c6bad69f7
      SHA256:241b4675c2de1d1291c9935ba9be2e1aba351d570237cb2c2c353f6514b323bd

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\index.js
      MD5: d67c3c52392959628346a7e0227e346f
      SHA1: 47359941645725fe549d17ce35acedd619947c5b
      SHA256:c48a1fed7281f54835422b19a741b2628531d9f2ea7e23558b5fa7a9fed8e448

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\index.js
      MD5: 1e6744bbf644a256113c8bb355bbeac9
      SHA1: 3d208788fdf39ab8f7522693884bfed0292db1d6
      SHA256:3a4de9a29c861a1b2eca1244139075abd92de04f9d991d10b2ef7d0c8b4f873a

      Identifiers

      • None

      index.js

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\index.js
      MD5: a5575dc3babbc574cf3d2c4e72dd5b6e
      SHA1: af6658b112abfbca841e3208c76b4a8b5372556a
      SHA256:61f2faa461e2d584330e5957a94195896c07f4737e5827c00f2fcb79a98ab65d

      Identifiers

      • None

      knex.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\db\knex.js
      MD5: 0d89878b0a957c455c285d89167f0648
      SHA1: 229634ed241c3faae5474912fe60dcdf5593aa36
      SHA256:c78bd45902199f1159966ac1f8866a09253b1d55c901311479a41eb71a1c033a

      Identifiers

      • None

      knexfile.js

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\db\knexfile.js
      MD5: a8012005729b0351fc354092967de84c
      SHA1: 16aada6b44c8e4ef2a276be6bb03c064f914c784
      SHA256:55f9834fd993e146c69053c1f272576708536c5ec947500c12dd13c134858d37

      Identifiers

      • None

      knexfile.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\db\knexfile.js
      MD5: 4b2ce4276ccd3484a5d2b4eae3c2879d
      SHA1: 6ad94f8fd95b769e23ae929f5119306413a59261
      SHA256:e9a1a177bdb5ef12207fdf61ff81edc1cbd297fd502fc68d256c1b161ac72db4

      Identifiers

      • None

      knexfile.js

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\db\knexfile.js
      MD5: e1e372638d8075e2a79c7219928bd46f
      SHA1: a37c3fdc3ec688bfa0bcf107f36e11823550f03b
      SHA256:d55ec49a6c7844d323a5f385d60575f8d98c35a09dd53003181e45be9569972c

      Identifiers

      • None

      knexfile.js

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\db\knexfile.js
      MD5: 6c04d16103a2fd520f3e200009bc5824
      SHA1: 82199613dca24acd10ba5c55dee23d1cca617cc9
      SHA256:bf032d74eef26bf88ffa43210b61a568406caab1889ab3e8285b758c5a318c92

      Identifiers

      • None

      lambda.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\lambda.js
      MD5: 25c0be513d88cddfcaaad10a1b8c2c1e
      SHA1: 2838374a3782b45a8e84d4180aac5397b8037fd4
      SHA256:0617340e2c15bb39122b059d40b858ca3aca4e91df59e7bcb2ebcfd1cd091d3d

      Identifiers

      • None

      merchantHandler.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\merchantHandler.js
      MD5: 5012cc9a27117958a61dc80d0f32599a
      SHA1: 05bd9b8b7ec1a9422b59db51482fcd6c37485025
      SHA256:600982c946280fb74aa3b0d9a101f0973231d38af333ca7283ec31cd4377e434

      Identifiers

      • None

      merchantRepository.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\merchantRepository.js
      MD5: 25ac65d729560097529fbc19b634adb6
      SHA1: 512fb04873d8c25c2e7d2ffd0f5d976a50ce1cad
      SHA256:5d73a12d277ea8a907fc158625340ffdbe6e408dcf762a8cb6b10ab8226bd3f4

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\CustomerHandlerNode\package.json
      MD5: 49e3b0e60b5dbdc14420d405a6b72043
      SHA1: 768766febcde99bc6827f791419d642520e4a5dc
      SHA256:0de83e15fe46d1b540861cb545b11c18272eabb61b8bfdfef408e95416f0631f

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\package.json
      MD5: 7c2c35e1988e2a0a6c2fc3ba94d4db77
      SHA1: 4030c46862a99ee869a914767806517b5410e039
      SHA256:fe916e6fb9913e21754b24cbfdda9388d9b026d7a60caec3c5ff61214cee1394

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\package.json
      MD5: a7377e0610237dffe432d2a2d17a0ea3
      SHA1: cb9914b0021e3a884fa99bd2466f0ddf46455398
      SHA256:6f58823a55fbdfac13e32c8358a1379e75cf33a8f56b45c8f68bae7f2c965649

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\PartnerHandlerNode\package.json
      MD5: d9f86edc7e6069df3c8f652593605d57
      SHA1: cb60f5f21120f5eda4400e40aa11ef6422240f75
      SHA256:7ede9a4cf2d4d217dc04ca5f4f3822bbcdfada3f07a691226ed09affc492ea7f

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\ResellerHandlerNode\package.json
      MD5: 55068878e06bfc18c2f2ead867969bad
      SHA1: ff79bcf7b22da930e03bf0ececf732974cf9a40a
      SHA256:c2a9f1056fab99cc2e6027fb15287f6fbfdeea7e682df1b336f7fdeeae53db9b

      Identifiers

      • None

      package.json

      File Path: D:\Auropayrepos\Masters\src\TermsAndConditionsHandlerNode\package.json
      MD5: 7d441516540426d9cbb11edd96824d02
      SHA1: 7f53ae313acf247dc5c308c05f07e5a2723e4efb
      SHA256:cbdf768e2f6378ce1a8d1e5cda21596f053315dc4d584119794c5769e725199d

      Identifiers

      • None

      paymentConfigurationFormRepository.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\paymentConfigurationFormRepository.js
      MD5: 6d09bf319aa19e1be48aca83256cd1cf
      SHA1: 4df939e28d3e6972dcfc4b19ca4c6efc75cb4b8d
      SHA256:1a229c91707b9b745224651a3febe2ce42df8319ef31afee92b9fe12a1a78330

      Identifiers

      • None

      paymentFormConfigurationDefaultSettingsRepository.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\paymentFormConfigurationDefaultSettingsRepository.js
      MD5: fbaec553f6e11e521400b9d6a6937aef
      SHA1: df3bc1a0c2abfe1c95a5c9603c28eb5de86b9433
      SHA256:0caf971a9672dc73f1d074cf004b1af7e6e0e19d7006ec364cf193d10fc45bfc

      Identifiers

      • None

      swagger.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger.js
      MD5: 8c966df86ee27632be72505b900f5916
      SHA1: 9763a3faecb7eb413fff25dc9b64d48180ad717d
      SHA256:2361cc5e66651683d9f2ad44475939cb656919330e9eda7752d39bceeb20a068

      Identifiers

      • None

      swaggerDefinition.js

      File Path: D:\Auropayrepos\Masters\src\MastersAPI\swagger\swaggerDefinition.js
      MD5: af76e9ca2050dad393bc3dfc56ae55c5
      SHA1: 7fe2baabb8d197f2d13319717c8ec0925eaa178a
      SHA256:75d3237630db4bd2279cd1eacfee36685607abe3f68a7731bf7aac6177a9fddb

      Identifiers

      • None

      termsAndConditionsRepository.js

      File Path: D:\Auropayrepos\Masters\src\MerchantHandlerNode\respositories\termsAndConditionsRepository.js
      MD5: 8328f5621350618a7f34142ace902295
      SHA1: 9e3491a7bcaed2571fc74857d7b39e312f0e2a66
      SHA256:867c7fba473f83dda4c0260dd86f3fb85baa555871d3b744e684871ceaf04aa0

      Identifiers

      • None

      testhost.dll

      Description:

      testhost

      File Path: D:\Auropayrepos\Masters\test\Masters.API.Tests\bin\Debug\net6.0\testhost.dll
      MD5: d9889d118d8d97b5cfc7f9a20f52a180
      SHA1: 2d249e0828ffdb0008df87041b846a4dec11e9cb
      SHA256:af85d164a295ef4018a8388b3b3873b9c47d07c2dc86df73cc0f30dd7b3c2eef

      Identifiers

      xunit.abstractions.dll

      Description:

      xUnit.net Abstractions (PCL)

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.abstractions.dll
      MD5: e3b2baab8aa8b05b47a10b492dc361ab
      SHA1: 0d9302f5baa697b21e7da1818a4f5fb997bba9bc
      SHA256:bef20106f1efa62f697977c9e3cc848be752931b52b8e48ff557f6f9862c9ec1

      Identifiers

      xunit.assert.dll

      Description:

      xUnit.net Assertion Library

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.assert.dll
      MD5: 1dcdd2fd045a7fdf577b23287bdce780
      SHA1: bfe54ffecf536a47b39c83fa80228adc1981a7c4
      SHA256:3c42330fc4657b1c12a83b7f487aaed39c7362aef34811b3a8a350817137ac2f

      Identifiers

      xunit.core.dll

      Description:

      xUnit.net Core

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.core.dll
      MD5: 37f41e0637bab35b11ec20603b108ffb
      SHA1: a92d377185862578297f267955a6e5618028935f
      SHA256:6cefb7283e54a9b0738172a1451416afa03893395d513bc74a9250398acd8be4

      Identifiers

      xunit.execution.dotnet.dll

      Description:

      xUnit.net Execution (dotnet)

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.execution.dotnet.dll
      MD5: 4c739d2d874a0382c528f8394f1741b3
      SHA1: d7c8b6eb3dabde46d30970892422fc81da7ad3e4
      SHA256:79ee217b43f69cc6bce3c7365f50717f6638ffe0cb1807f74f09d6025e42cd39

      Identifiers

      xunit.runner.reporters.netcoreapp10.dll

      Description:

      xUnit.net Runner Reporters (.NET Core 1.0)

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.reporters.netcoreapp10.dll
      MD5: 5e4d7b11a4e9e5cba20ff025d4975677
      SHA1: 6f082257f4b060dbbb40c78be4d095743f5e5c41
      SHA256:db75d39d557442d5425d28c92e846c97b22ff366458148e8eef103c5d2834064

      Identifiers

      xunit.runner.utility.netcoreapp10.dll

      Description:

      xUnit.net Runner Utility (.NET Core 1.0)

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.utility.netcoreapp10.dll
      MD5: 8569a556d47acae61b77d06d0af97227
      SHA1: b86ca8bf747e485382bd6c500a964d43cbd4da92
      SHA256:727f9f94a644a389441728c9815126e0b898c6059de6199afbba54e92b0d6ef3

      Identifiers

      xunit.runner.visualstudio.dotnetcore.testadapter.dll

      Description:

      xUnit.net Runner for Visual Studio (.NET Core 1.0)

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\bin\Debug\net6.0\xunit.runner.visualstudio.dotnetcore.testadapter.dll
      MD5: fc0a2e411e0bea13a8a48049bafa0377
      SHA1: c56760657b70d1a7e3617ff0b30cd5c19270f401
      SHA256:d25fa141f326253ef50cecdd6c94fddc94f867c6d028c157cbc884eda12f57d0

      Identifiers

      xunit.runner.visualstudio:2.3.1

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj

      Identifiers

      xunit:2.3.1

      File Path: D:\Auropayrepos\Masters\test\WebhookEventHandler.Tests\WebhookEventHandler.Tests.csproj

      Identifiers



      This report contains data retrieved from the National Vulnerability Database.
      This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
      This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
      This report may contain data retrieved from RetireJS.
      This report may contain data retrieved from the Sonatype OSS Index.