microsoft.aspnetcore.authentication.certificate.6.0.10.nupkg: 1 vulnerabilities (highest severity is: 7.5) #688
Labels
Mend: dependency security vulnerability
Security vulnerability detected by Mend
Vulnerable Library - microsoft.aspnetcore.authentication.certificate.6.0.10.nupkg
Path to dependency file: /src/Certify.Server/Certify.Server.Api.Public.Tests/Certify.Server.Api.Public.Tests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/6.0.1/microsoft.extensions.caching.memory.6.0.1.nupkg
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-43483
Vulnerable Library - microsoft.extensions.caching.memory.6.0.1.nupkg
In-memory cache implementation of Microsoft.Extensions.Caching.Memory.IMemoryCache.
Library home page: https://api.nuget.org/packages/microsoft.extensions.caching.memory.6.0.1.nupkg
Path to dependency file: /src/Certify.Server/Certify.Server.Api.Public.Tests/Certify.Server.Api.Public.Tests.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.extensions.caching.memory/6.0.1/microsoft.extensions.caching.memory.6.0.1.nupkg
Dependency Hierarchy:
Found in base branch: development
Vulnerability Details
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
Publish Date: 2024-10-08
URL: CVE-2024-43483
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-qj66-m88j-hmgj
Release Date: 2024-10-08
Fix Resolution: System.IO.Packaging - 6.0.1,8.0.1,9.0.0-rc.2.24473.5, Microsoft.Extensions.Caching.Memory - 6.0.2,8.0.1,9.0.0-rc.2.24473.5, System.Security.Cryptography.Cose - 8.0.1,9.0.0-rc.2.24473.5
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: