Skip to content

Conversation

Redwoodtj
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 6 vulnerabilities in the nuget dependencies of this project.

Snyk changed the following file(s):

  • 2-WebApp-graph-user/2-1-Call-MSGraph/WebApp-OpenIDConnect-DotNet-graph.csproj

Vulnerabilities that will be fixed with an upgrade:

Issue Score
high severity Denial of Service (DoS)
SNYK-DOTNET-SYSTEMSECURITYCRYPTOGRAPHYPKCS-5708426
  696  
high severity Remote Code Execution (RCE)
SNYK-DOTNET-AZUREIDENTITY-6009155
  654  
high severity Regular Expression Denial of Service (ReDoS)
SNYK-DOTNET-SYSTEMTEXTREGULAREXPRESSIONS-174708
  589  
medium severity Improper Input Validation
SNYK-DOTNET-SYSTEMFORMATSASN1-7443633
  559  
medium severity Information Exposure Through an Error Message
SNYK-DOTNET-AZUREIDENTITY-6597976
  489  
medium severity Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
SNYK-DOTNET-AZUREIDENTITY-7246762
  489  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Remote Code Execution (RCE)
🦉 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
🦉 Improper Input Validation
🦉 More lessons are available in Snyk Learn

Copy link

google-cla bot commented May 22, 2025

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants