Open mend-for-github-com[bot] opened 1 year ago
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
:information_source: This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory.
Vulnerable Library - microsoft.entityframeworkcore.sqlserver.3.0.0.nupkg
Path to dependency file: /TranscriptionBlogPostDemo/TranscriptionBlogPostDemo.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.data.sqlclient/1.0.19249.1/microsoft.data.sqlclient.1.0.19249.1.nupkg
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-0056
### Vulnerable Library - microsoft.data.sqlclient.1.0.19249.1.nupkgProvides the data provider for SQL Server. These classes provide access to versions of SQL Server an...
Library home page: https://api.nuget.org/packages/microsoft.data.sqlclient.1.0.19249.1.nupkg
Path to dependency file: /TranscriptionBlogPostDemo/TranscriptionBlogPostDemo.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.data.sqlclient/1.0.19249.1/microsoft.data.sqlclient.1.0.19249.1.nupkg
Dependency Hierarchy: - microsoft.entityframeworkcore.sqlserver.3.0.0.nupkg (Root Library) - :x: **microsoft.data.sqlclient.1.0.19249.1.nupkg** (Vulnerable Library)
Found in base branch: main
### Vulnerability DetailsMicrosoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Security Feature Bypass Vulnerability
Publish Date: 2024-01-09
URL: CVE-2024-0056
### CVSS 3 Score Details (8.7)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-98g6-xh36-x2p7
Release Date: 2024-01-09
Fix Resolution: Microsoft.Data.SqlClient - 2.1.7,3.1.5,4.0.5,5.1.3, System.Data.SqlClient - 4.8.6
CVE-2022-41064
### Vulnerable Library - microsoft.data.sqlclient.1.0.19249.1.nupkgProvides the data provider for SQL Server. These classes provide access to versions of SQL Server an...
Library home page: https://api.nuget.org/packages/microsoft.data.sqlclient.1.0.19249.1.nupkg
Path to dependency file: /TranscriptionBlogPostDemo/TranscriptionBlogPostDemo.csproj
Path to vulnerable library: /home/wss-scanner/.nuget/packages/microsoft.data.sqlclient/1.0.19249.1/microsoft.data.sqlclient.1.0.19249.1.nupkg
Dependency Hierarchy: - microsoft.entityframeworkcore.sqlserver.3.0.0.nupkg (Root Library) - :x: **microsoft.data.sqlclient.1.0.19249.1.nupkg** (Vulnerable Library)
Found in base branch: main
### Vulnerability Details.NET Framework Information Disclosure Vulnerability Mend Note: Converted from WS-2022-0377, on 2022-11-10.
Publish Date: 2022-11-09
URL: CVE-2022-41064
### CVSS 3 Score Details (5.8)Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here. ### Suggested FixType: Upgrade version
Origin: https://github.com/advisories/GHSA-8g2p-5pqh-5jmc
Release Date: 2022-11-09
Fix Resolution: Microsoft.Data.SqlClient - 1.1.4,2.1.2;System.Data.SqlClient - 4.8.5