Vulnerability Database
Blog
FAQ
Docs
CVE-2023-33170
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-33170
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-33170.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-33170
Aliases
BIT-dotnet-2023-33170
BIT-dotnet-sdk-2023-33170
GHSA-25c8-p796-jg6r
Related
ALSA-2023:4057
ALSA-2023:4058
ALSA-2023:4059
ALSA-2023:4060
RHSA-2023:4057
RHSA-2023:4058
RHSA-2023:4059
RHSA-2023:4060
RHSA-2023:4061
RHSA-2023:4448
RHSA-2023:4449
RLSA-2023:4058
RLSA-2023:4059
UBUNTU-CVE-2023-33170
USN-6217-1
Published
2023-07-11T18:15:15Z
Modified
2024-10-12T10:56:10.674959Z
Severity
8.1 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Calculator
Summary
[none]
Details
ASP.NET and Visual Studio Security Feature Bypass Vulnerability
References
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/
Affected packages
Git
/
github.com/dotnet/core
Affected ranges
Type
GIT
Repo
https://github.com/dotnet/core
Events
Introduced
63772e2191a750dd3cafa75914cacdb038c7520c
Fixed
7971fb8b132725dfb213f23794998d4d2fa4d7ae
Affected versions
v3.*
v3.1.31
v3.1.32
v6.*
v6.0.11
v6.0.12
v6.0.13
v6.0.14
v6.0.15
v6.0.16
v6.0.18
v6.0.19
v7.*
v7.0.0
v7.0.1
v7.0.2
v7.0.3
v7.0.4
v7.0.5
v7.0.7
v7.0.8
v8.*
v8.0.0-preview.1
v8.0.0-preview.2
v8.0.0-preview.3
v8.0.0-preview.4
v8.0.0-preview.5
CVE-2023-33170 - OSV