Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: Testing

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
auropay-refund.js 00
auropay.js 00
bootstrap.min.js 00
jquery.blockUI.js 00
jquery.blockUI.min.js 00
jquery.flot.min.js 00
jquery.flot.time.min.js 00
time-report-by-date.js 00

Dependencies (vulnerable)

auropay-refund.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\auropay-refund.js
MD5: 3628d59f506bcb67431f116ebd4da22f
SHA1: 95060aa2885c969848759c07daf1c89c14d50387
SHA256:26c43172741926f046660548d4aaef0dd20749e297e6b5e6ee8d548e468d642f

Identifiers

  • None

auropay.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\auropay.js
MD5: 9f00532ee5e261c6e9cdde6cfb36de69
SHA1: 31eeb436a27b75106fcbb6b31b8ce1318ea3bc70
SHA256:3f8797fed4c2ec1fa0179ab6f7d2c8dba7386bd06cf0e261de4555f87582464d

Identifiers

  • None

bootstrap.min.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\bootstrap-5.3.3\js\bootstrap.min.js
MD5: f031fc3fc2f16ebcd7ed6a997e35c10a
SHA1: 5e158b620727f308a173d0e5f866dfb839653ddf
SHA256:6824c8ab0f68a745d01989cd7b5eb8f55edf9e2840083e3c38fdccf013f6c553

Identifiers

  • None

jquery.blockUI.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\jquery-blockui\jquery.blockUI.js
MD5: d3b33583c702376dc172c46c47be551a
SHA1: 525f52a30dc14c5d93089b9de11ea06ef398f71a
SHA256:dcdba06a6df3556bad8f105222bdfcadf3d41227aacc794dff829d3ff1afe833

Identifiers

  • None

jquery.blockUI.min.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\jquery-blockui\jquery.blockUI.min.js
MD5: aa1a5cc312f499994ef31b832a9ff149
SHA1: cde8a4f1f63b0d197b70ad144038629f8c79a69c
SHA256:c18c116232b7ea328a800f940a4e9009eee55861ecdd3a8ec388b6625a81057d

Identifiers

  • None

jquery.flot.min.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\jquery-flot\jquery.flot.min.js
MD5: 20ffb5e660cd7b16a8c94724492719dd
SHA1: f9b8815edae02c293b413579c3b30c3375362b7e
SHA256:e26964e93604992beda3dc0cfadb62843b7e846c11baaf1da45652feaf849021

Identifiers

  • None

jquery.flot.time.min.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\jquery-flot\jquery.flot.time.min.js
MD5: bd1d1917e9540af851481001f954e04e
SHA1: 00b9ff6d9248ea8f369df435d4de21fa1ee5ec29
SHA256:6a9c6d4ab8bbbcc99589bc2a0ef60339ecab27d93a8292756d08286ee028b16c

Identifiers

  • None

time-report-by-date.js

File Path: D:\Auropayrepos\Auropay-Plugins\Wordpress\auropay-gateway\assets\js\time-report-by-date.js
MD5: 9817b72f8de79807355317c699f600ae
SHA1: 786d85b0376d8c0b636ee4d6ffadf4b6a94fdeba
SHA256:6e85fc517a636a73cf3f717619b0d6757d7559f4033ac4f5305e24268a19de84

Identifiers

  • None


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.