Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/dotnet6-build@6.0.106-r0?arch=armhf&distroversion=v3.19&reponame=community
Typeapk
Namespacealpine
Namedotnet6-build
Version6.0.106-r0
Qualifiers
arch armhf
distroversion v3.19
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.0.108-r0
Latest_non_vulnerable_version6.0.131-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4hu8-jhhk-7uf3
vulnerability_id VCID-4hu8-jhhk-7uf3
summary
Potential leak of NuGet.org API key
### Description 

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0) where a nuget.org api key could leak due to an incorrect comparison with a server url.

### Affected software 

#### NuGet & NuGet Packages

- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.2.0 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 6.0.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.11.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.9.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 5.7.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat 4.9.4 version or earlier.

#### .NET SDK(s)

- Any .NET 6.0 application running on .NET 6.0.5 or earlier.
- Any .NET 3.1 application running on .NET Core 3.1.25 or earlier.

### Patches 

- If you're using NuGet.exe 6.2.0 or lower, you should download and install 6.2.1 from https://dist.nuget.org/win-x86-commandline/v6.2.1/nuget.exe. 

- If you're using NuGet.exe 6.0.1 or lower, you should download and install 6.0.2 from https://dist.nuget.org/win-x86-commandline/v6.0.2/nuget.exe. 

- If you're using NuGet.exe 5.11.1 or lower, you should download and install 5.11.2 from https://dist.nuget.org/win-x86-commandline/v5.11.2/nuget.exe. 

- If you're using NuGet.exe 5.9.1 or lower, you should download and install 5.9.2 from https://dist.nuget.org/win-x86-commandline/v5.9.2/nuget.exe. 

- If you're using NuGet.exe 5.7.1 or lower, you should download and install 5.7.2 from https://dist.nuget.org/win-x86-commandline/v4.7.2/nuget.exe. 

- If you're using NuGet.exe 4.9.4 or lower, you should download and install 4.9.5 from https://dist.nuget.org/win-x86-commandline/v4.9.5/nuget.exe. 

- If you're using .NET Core 6.0, you should download and install Runtime 6.0.6 or SDK 6.0.106 (for Visual Studio 2022 v17.0) or SDK 6.0.301 (for Visual Studio 2022 v17.2)  from https://dotnet.microsoft.com/download/dotnet-core/6.0. 

- If you're using .NET Core 3.1, you should download and install Runtime 3.1.26 or SDK 3.1.420 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1 

.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates. 

### Other Details 

Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/62
 
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-30184
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30184.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30184
reference_id
reference_type
scores
0
value 0.00591
scoring_system epss
scoring_elements 0.69271
published_at 2026-04-18T12:55:00Z
1
value 0.00591
scoring_system epss
scoring_elements 0.69263
published_at 2026-04-16T12:55:00Z
2
value 0.00591
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-13T12:55:00Z
3
value 0.00591
scoring_system epss
scoring_elements 0.69174
published_at 2026-04-02T12:55:00Z
4
value 0.00591
scoring_system epss
scoring_elements 0.69194
published_at 2026-04-04T12:55:00Z
5
value 0.00591
scoring_system epss
scoring_elements 0.69175
published_at 2026-04-07T12:55:00Z
6
value 0.00591
scoring_system epss
scoring_elements 0.69226
published_at 2026-04-08T12:55:00Z
7
value 0.00591
scoring_system epss
scoring_elements 0.69244
published_at 2026-04-09T12:55:00Z
8
value 0.00591
scoring_system epss
scoring_elements 0.69266
published_at 2026-04-11T12:55:00Z
9
value 0.00591
scoring_system epss
scoring_elements 0.69252
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30184
2
reference_url https://github.com/NuGet/Home/issues/11883#issuecomment-1156194755
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/Home/issues/11883#issuecomment-1156194755
3
reference_url https://github.com/NuGet/NuGet.Client
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client
4
reference_url https://github.com/NuGet/NuGet.Client/commit/ec6e62a645ec6b53a8784bf4571cac7786fd700b#diff-9e678e6dcc29381eb7c564f0e75ffc3ffc35458eca412c35b6404340b698d074R58-R65
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/commit/ec6e62a645ec6b53a8784bf4571cac7786fd700b#diff-9e678e6dcc29381eb7c564f0e75ffc3ffc35458eca412c35b6404340b698d074R58-R65
5
reference_url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-3885-8gqc-3wpf
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-3885-8gqc-3wpf
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K
10
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-28T19:25:47Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-30184
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-30184
12
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2096963
reference_id 2096963
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2096963
14
reference_url https://github.com/advisories/GHSA-3885-8gqc-3wpf
reference_id GHSA-3885-8gqc-3wpf
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3885-8gqc-3wpf
15
reference_url https://access.redhat.com/errata/RHSA-2022:5046
reference_id RHSA-2022:5046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5046
16
reference_url https://access.redhat.com/errata/RHSA-2022:5047
reference_id RHSA-2022:5047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5047
17
reference_url https://access.redhat.com/errata/RHSA-2022:5050
reference_id RHSA-2022:5050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5050
18
reference_url https://access.redhat.com/errata/RHSA-2022:5061
reference_id RHSA-2022:5061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5061
19
reference_url https://access.redhat.com/errata/RHSA-2022:5062
reference_id RHSA-2022:5062
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5062
fixed_packages
0
url pkg:apk/alpine/dotnet6-build@6.0.106-r0?arch=armhf&distroversion=v3.19&reponame=community
purl pkg:apk/alpine/dotnet6-build@6.0.106-r0?arch=armhf&distroversion=v3.19&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet6-build@6.0.106-r0%3Farch=armhf&distroversion=v3.19&reponame=community
aliases CVE-2022-30184, GHSA-3885-8gqc-3wpf, GMS-2022-2161, GMS-2022-2162, GMS-2022-2163
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4hu8-jhhk-7uf3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/dotnet6-build@6.0.106-r0%3Farch=armhf&distroversion=v3.19&reponame=community