Dependency-Check is an open source tool performing a best effort analysis of 3rd party dependencies; false positives and false negatives may exist in the analysis performed by the tool. Use of the tool and the reporting provided constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to the analysis or its use. Any use of the tool and the reporting provided is at the user’s risk. In no event shall the copyright holder or OWASP be held liable for any damages whatsoever arising out of or in connection with the use of this tool, the analysis performed, or the resulting report.

How to read the report | Suppressing false positives | Getting Help: github issues

 Sponsor

Project: test

Scan Information (show all):

Summary

Display: Showing Vulnerable Dependencies (click to show all)

DependencyVulnerability IDsPackageHighest SeverityCVE CountConfidenceEvidence Count
DNS.dllpkg:generic/DNS@6.0.1 09
DNS:6.1.0cpe:2.3:a:net_dns:net_dns:6.1.0:*:*:*:*:*:*:*pkg:nuget/DNS@6.1.0CRITICAL1Low3
DependencyCheckExample.csproj 02
DependencyCheckExample.dll 09
DependencyCheckExample.dll 09
Microsoft.Win32.SystemEvents.dllpkg:generic/Microsoft.Win32.SystemEvents@4.700.19.56404 010
Oracle.ManagedDataAccess.Core:3.21.1pkg:nuget/Oracle.ManagedDataAccess.Core@3.21.1HIGH16
Oracle.ManagedDataAccess.dllpkg:generic/Oracle.ManagedDataAccess@4.122.21.1 07
Oracle.ManagedDataAccess:21.4.0pkg:nuget/Oracle.ManagedDataAccess@21.4.0HIGH15
System.Configuration.ConfigurationManager.dllpkg:generic/System.Configuration.ConfigurationManager@4.700.19.56404 012
System.Data.SqlClient.dllcpe:2.3:a:www-sql_project:www-sql:4.700.21.41603:*:*:*:*:*:*:*pkg:generic/System.Data.SqlClient@4.700.21.41603 0Low14
System.Data.SqlClient:4.8.3pkg:nuget/System.Data.SqlClient@4.8.3MEDIUM15
System.Diagnostics.PerformanceCounter.dllpkg:generic/System.Diagnostics.PerformanceCounter@4.700.19.56404 012
System.DirectoryServices.Protocols.dllpkg:generic/System.DirectoryServices.Protocols@4.700.19.56404 012
System.DirectoryServices.dllpkg:generic/System.DirectoryServices@4.700.19.56404 012
System.Drawing.Common.dllpkg:generic/System.Drawing.Common@4.6.26919.02 013
System.Drawing.Common.dllpkg:generic/System.Drawing.Common@4.700.19.56404 012
System.Security.Cryptography.ProtectedData.dllpkg:generic/System.Security.Cryptography.ProtectedData@4.700.19.56404 012
System.Security.Permissions.dllpkg:generic/System.Security.Permissions@4.700.19.56404 014
System.Windows.Extensions.dllcpe:2.3:a:microsoft:.net_core:4.700.19.56404:*:*:*:*:*:*:*pkg:generic/System.Windows.Extensions@4.700.19.56404 0Low10
jQuery.Validation:1.19.3pkg:nuget/jQuery.Validation@1.19.3MEDIUM14
sni.dll 02
sni.dll 02
sni.dll 02

Dependencies (vulnerable)

DNS.dll

Description:

DNS

Library for parsing and serializing DNS messages. Includes a basic DNS client and server.

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/DNS.dll
MD5: 510424f5a1ae62687069ff427af72cf9
SHA1: 850e140457c8590af7fe5a53dec6d3effc2e33c3
SHA256:749903465e037987b203930f4f24a3f8faa013164498a21f0a755eda4a59d3a9

Identifiers

DNS:6.1.0

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj

Identifiers

  • pkg:nuget/DNS@6.1.0  (Confidence:Highest)
  • cpe:2.3:a:net_dns:net_dns:6.1.0:*:*:*:*:*:*:*  (Confidence:Low)  

CVE-2021-4248 (OSSINDEX)  

A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 is able to address this issue. The name of the patch is cf7105aa2aae90d6656088fe5a8ee1d5730773b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216188.
CWE-330 Use of Insufficiently Random Values

CVSSv3:
  • Base Score: CRITICAL (9.8)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:DNS:6.1.0:*:*:*:*:*:*:*

DependencyCheckExample.csproj

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj
MD5: 5cf667e4f1bfff77504c9f3a57384f6f
SHA1: 34d8f4db66a505f5bb4f7704dd6248b9dfc041f8
SHA256:12da4ee91851c6075880e023ea518c5eec4cd0a4d237fd94ee350996a963ee43

Identifiers

  • None

DependencyCheckExample.dll

Description:

DependencyCheckExample

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/DependencyCheckExample.dll
MD5: a19f6ab63d74911bb59130a44fdc7f73
SHA1: 931d0da3ad8bac0c537713224c70b5ed1672562c
SHA256:ca776b3922f9f009113d279e5937706026d8af18f11bf87a39bdfa6aa53a2a56

Identifiers

  • None

DependencyCheckExample.dll

Description:

DependencyCheckExample

File Path: /github/workspace/src/DependencyCheckExample/obj/Debug/net7.0/ref/DependencyCheckExample.dll
MD5: 24a9bcdee3ac3715e165e82c9a255c96
SHA1: ea802f0cdf4c838c3f584a6646ff586bff40a2db
SHA256:614413977275c782889040da55171cf9aacb241b31ab9e28284ffd3156820fad

Identifiers

  • None

Microsoft.Win32.SystemEvents.dll

Description:

Microsoft.Win32.SystemEvents

Microsoft.Win32.SystemEvents

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/Microsoft.Win32.SystemEvents.dll
MD5: dd6399dc9bc839c0c66dd22a394d249c
SHA1: dc1afa18437751d0842a9ce36c2cf9ab957c2725
SHA256:e7a3165fb182ba25be3b410fce4528d238fa4ff9a1a5507ac7e50542d692daa1

Identifiers

Oracle.ManagedDataAccess.Core:3.21.1

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj

Identifiers

CVE-2023-21893 (OSSINDEX)  

Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server.  Supported versions that are affected are 19c and  21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
CWE-noinfo

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:Oracle.ManagedDataAccess.Core:3.21.1:*:*:*:*:*:*:*

Oracle.ManagedDataAccess.dll

Description:

Oracle.ManagedDataAccess.dll

Oracle.ManagedDataAccess.dll

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/Oracle.ManagedDataAccess.dll
MD5: 22a079bca9882c8106b87b846f0a03cf
SHA1: d892ee4f0e681d33e821e5d0640218aea6204ccc
SHA256:82a2b223f510add06cdda2b497ab0d63febb6b0e988af1f697abb67ec6ebd237

Identifiers

Oracle.ManagedDataAccess:21.4.0

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj

Identifiers

CVE-2023-21893 (OSSINDEX)  

Vulnerability in the Oracle Data Provider for .NET component of Oracle Database Server.  Supported versions that are affected are 19c and  21c. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TCPS to compromise Oracle Data Provider for .NET.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Oracle Data Provider for .NET. Note: Applies also to Database client-only on Windows platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
CWE-noinfo

CVSSv3:
  • Base Score: HIGH (7.5)
  • Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:Oracle.ManagedDataAccess:21.4.0:*:*:*:*:*:*:*

System.Configuration.ConfigurationManager.dll

Description:

System.Configuration.ConfigurationManager

System.Configuration.ConfigurationManager

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Configuration.ConfigurationManager.dll
MD5: 70e81bfc1dcce3aa3ab30c3abaf3ea53
SHA1: 2132451e6dc8b1c18568181ddb5d697a491ef7fa
SHA256:4668f89524fcb4d71950e0ad7e0d56e5e5db2c70e395ad49f7db6a8164cc50d6

Identifiers

System.Data.SqlClient.dll

Description:

System.Data.SqlClient

System.Data.SqlClient

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Data.SqlClient.dll
MD5: 5dab94399d68803d02574944e1c92fe8
SHA1: 946b586a2264d2e95fbf3ceee438e57a5031f8e4
SHA256:30486583763dc4f8383d5c39d2d74772d9731c7a874c02edd5d3a58c8f38249a

Identifiers

System.Data.SqlClient:4.8.3

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj

Identifiers

CVE-2022-41064 (OSSINDEX)  

.NET Framework Information Disclosure Vulnerability

Sonatype's research suggests that this CVE's details differ from those defined at NVD. See https://ossindex.sonatype.org/vulnerability/CVE-2022-41064 for details
CWE-noinfo

CVSSv3:
  • Base Score: MEDIUM (5.8)
  • Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:System.Data.SqlClient:4.8.3:*:*:*:*:*:*:*

System.Diagnostics.PerformanceCounter.dll

Description:

System.Diagnostics.PerformanceCounter

System.Diagnostics.PerformanceCounter

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Diagnostics.PerformanceCounter.dll
MD5: 2f4cdc54748a20727a0cdf0b38184a72
SHA1: d80ce87e279fd8ddd5823359c2c05003388e9817
SHA256:621f48ccc94d6acb0d03f0071f1f0829c3fb9950c95abb84617b1926bd13dbc2

Identifiers

System.DirectoryServices.Protocols.dll

Description:

System.DirectoryServices.Protocols

System.DirectoryServices.Protocols

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.DirectoryServices.Protocols.dll
MD5: ba0e982e84490ee208a78f586837c171
SHA1: b319c2fdae51ddbe0b22fa68f7e326a911f2993c
SHA256:8805680a68ffe54e71668b92a1476c26de6f536ab562c28ce31f3192d4b6c7ad

Identifiers

System.DirectoryServices.dll

Description:

System.DirectoryServices

System.DirectoryServices

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.DirectoryServices.dll
MD5: 231580a00c6d1c7e1954ae275daa118b
SHA1: 1bee5bb1f3f2dcf4abd047d877b76465ee446ad7
SHA256:0eb7c9ecb57c059efd0613b841a520a4da84fa0270fb0bf59ab0a5d1b76564d5

Identifiers

System.Drawing.Common.dll

Description:

System.Drawing.Common

System.Drawing.Common

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Drawing.Common.dll
MD5: 2bb2433323109421d538d57b3839585b
SHA1: 61b91ab9add755e0ab82c02602d6746ad94d6779
SHA256:13efece14e17b7f885afff8377b652a975c038964a8273805b80b9afb38f7077

Identifiers

System.Drawing.Common.dll

Description:

System.Drawing.Common

System.Drawing.Common

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/runtimes/unix/lib/netcoreapp3.0/System.Drawing.Common.dll
MD5: db35a96e741da1811826b56b660c84b8
SHA1: 67e3da6371bcbc914ad23e1165a04f09ef805cc1
SHA256:000b09d998b23159ab9e7ef87c7cb09aad8c9cfb366f4ae69dfca50af5a166c0

Identifiers

System.Security.Cryptography.ProtectedData.dll

Description:

System.Security.Cryptography.ProtectedData

System.Security.Cryptography.ProtectedData

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Security.Cryptography.ProtectedData.dll
MD5: 6133f65f8f26de5d5e2c88b4add50698
SHA1: 373afbbe34e7522541bc3a1a6f22cdc20a1472a1
SHA256:8604f8d2e3e932710b634730b29a245c896ceadfd64a62001e582e9171532f13

Identifiers

System.Security.Permissions.dll

Description:

System.Security.Permissions

System.Security.Permissions

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Security.Permissions.dll
MD5: 3a92c18c24d85f60f23becd852f1510a
SHA1: f8eed1fad4218f32a1251fac65d42dbed903fc77
SHA256:74ef3b67960a9b569fed9ac457157769dbfe433b0f4fa13c52167c2246bfed71

Identifiers

System.Windows.Extensions.dll

Description:

System.Windows.Extensions

System.Windows.Extensions

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/System.Windows.Extensions.dll
MD5: bdd02096130ca18e3238528abb813345
SHA1: 0ec7446726e7ec2c32ffeb24133dfc4d88f0ae45
SHA256:abbe8146fa3f638ee9f5aaae85182d72de7807c9f0a06311ef14eb4e5f3cb3b0

Identifiers

jQuery.Validation:1.19.3

File Path: /github/workspace/src/DependencyCheckExample/DependencyCheckExample.csproj

Identifiers

CVE-2021-43306 (OSSINDEX)  

jquery-validation - Regular expression Denial of Service (ReDoS)

jquery-validation - Regular expression Denial of Service (ReDoS)
CWE-1333 Inefficient Regular Expression Complexity

CVSSv3:
  • Base Score: MEDIUM (5.9)
  • Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

References:

Vulnerable Software & Versions (OSSINDEX):

  • cpe:2.3:a:*:jQuery.Validation:1.19.3:*:*:*:*:*:*:*

sni.dll

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/runtimes/win-arm64/native/sni.dll
MD5: 167136d7a81bcc85acf4930aa7ac835f
SHA1: 1e70240cc820796e78d77b1219291eee2fb6dbe0
SHA256:ef18458c4dcb93f6b4eac07e1589cf3450bf878f2dd623f5d34f6a0f1b16e57a

Identifiers

  • None

sni.dll

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/runtimes/win-x64/native/sni.dll
MD5: 7f1799b65b98450a19e4d049e9d3e70d
SHA1: ec80c5a33374423a9e986c383a36a97da70a3584
SHA256:68705c4ef9ab818f2956a78e05f3fefce501a1448793b073b46110beb49b47d6

Identifiers

  • None

sni.dll

File Path: /github/workspace/src/DependencyCheckExample/bin/Debug/net7.0/runtimes/win-x86/native/sni.dll
MD5: c62a83f20bc23aeface70ec13003c4c5
SHA1: 35553cfcdcbeccdc49710e68aec495c16880f0bd
SHA256:1446d6b26da49a5a9f366972f89f4e236f916955f31ddc38ebb96217c1cace9c

Identifiers

  • None


This report contains data retrieved from the National Vulnerability Database.
This report may contain data retrieved from the CISA Known Exploited Vulnerability Catalog.
This report may contain data retrieved from the Github Advisory Database (via NPM Audit API).
This report may contain data retrieved from RetireJS.
This report may contain data retrieved from the Sonatype OSS Index.