Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/NuGet.Commands@6.3.1
Typenuget
Namespace
NameNuGet.Commands
Version6.3.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version6.3.3
Latest_non_vulnerable_version6.6.1
Affected_by_vulnerabilities
0
url VCID-yp6p-q3tf-5qb7
vulnerability_id VCID-yp6p-q3tf-5qb7
summary NuGet Client Remote Code Execution Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29337.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29337
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54766
published_at 2026-04-02T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54805
published_at 2026-04-09T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54808
published_at 2026-04-08T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.54758
published_at 2026-04-07T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54788
published_at 2026-04-04T12:55:00Z
5
value 0.00338
scoring_system epss
scoring_elements 0.56656
published_at 2026-04-13T12:55:00Z
6
value 0.00338
scoring_system epss
scoring_elements 0.56677
published_at 2026-04-12T12:55:00Z
7
value 0.00338
scoring_system epss
scoring_elements 0.56702
published_at 2026-04-11T12:55:00Z
8
value 0.00338
scoring_system epss
scoring_elements 0.56687
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29337
3
reference_url https://github.com/NuGet/NuGet.Client
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client
4
reference_url https://github.com/NuGet/NuGet.Client/commit/7fe6b814c901490292f02d8ea12749505fbb959a
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/commit/7fe6b814c901490292f02d8ea12749505fbb959a
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050835
reference_id 1050835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1050835
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2213703
reference_id 2213703
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2213703
7
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
reference_id CVE-2023-29337
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-04T01:31:31Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29337
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29337
reference_id CVE-2023-29337
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-29337
9
reference_url https://github.com/advisories/GHSA-6qmf-mmc7-6c2p
reference_id GHSA-6qmf-mmc7-6c2p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6qmf-mmc7-6c2p
10
reference_url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-6qmf-mmc7-6c2p
reference_id GHSA-6qmf-mmc7-6c2p
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-6qmf-mmc7-6c2p
11
reference_url https://access.redhat.com/errata/RHSA-2023:3580
reference_id RHSA-2023:3580
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3580
12
reference_url https://access.redhat.com/errata/RHSA-2023:3581
reference_id RHSA-2023:3581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3581
13
reference_url https://access.redhat.com/errata/RHSA-2023:3582
reference_id RHSA-2023:3582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3582
14
reference_url https://access.redhat.com/errata/RHSA-2023:3592
reference_id RHSA-2023:3592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3592
15
reference_url https://access.redhat.com/errata/RHSA-2023:3593
reference_id RHSA-2023:3593
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3593
16
reference_url https://access.redhat.com/errata/RHSA-2023:4448
reference_id RHSA-2023:4448
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4448
17
reference_url https://access.redhat.com/errata/RHSA-2023:4449
reference_id RHSA-2023:4449
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4449
18
reference_url https://usn.ubuntu.com/6161-1/
reference_id USN-6161-1
reference_type
scores
url https://usn.ubuntu.com/6161-1/
fixed_packages
0
url pkg:nuget/NuGet.Commands@6.3.3
purl pkg:nuget/NuGet.Commands@6.3.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.3.3
1
url pkg:nuget/NuGet.Commands@6.4.2
purl pkg:nuget/NuGet.Commands@6.4.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.4.2
2
url pkg:nuget/NuGet.Commands@6.5.1
purl pkg:nuget/NuGet.Commands@6.5.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yp6p-q3tf-5qb7
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.5.1
3
url pkg:nuget/NuGet.Commands@6.6.1
purl pkg:nuget/NuGet.Commands@6.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.6.1
aliases CVE-2023-29337, GHSA-6qmf-mmc7-6c2p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yp6p-q3tf-5qb7
Fixing_vulnerabilities
0
url VCID-5fx1-z4cb-hyd8
vulnerability_id VCID-5fx1-z4cb-hyd8
summary
NuGet Elevation of Privilege Vulnerability
## Description

Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 7.0.0-rc, .NET 6.0, .NET Core 3.1, and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol). This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET 7.0.0-rc.1, .NET 6.0, .NET Core 3.1, and NuGet clients (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol) where a malicious actor could cause a user to execute arbitrary code.

## Affected software

### NuGet & NuGet Packages

- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.3.0 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.2.1 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 6.0.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.11.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.9.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 5.7.2 version or earlier.
- Any NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol 4.9.5 version or earlier.

### .NET SDK(s)

- Any .NET 6.0 application running on .NET 6.0.9 or earlier.
- Any .NET 3.1 application running on .NET Core 3.1.29 or earlier.

## Patches

To fix the issue, please install the latest version of .NET 6.0 or .NET Core 3.1 and NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.Protocol versions). If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.

- If you're using NuGet.exe 6.3.0 or lower, you should download and install 6.3.1 from https://dist.nuget.org/win-x86-commandline/v6.3.1/nuget.exe .

- If you're using NuGet.exe 6.2.1 or lower, you should download and install 6.2.2 from https://dist.nuget.org/win-x86-commandline/v6.2.2/nuget.exe .

- If you're using NuGet.exe 6.0.2 or lower, you should download and install 6.0.3 from https://dist.nuget.org/win-x86-commandline/v6.0.3/nuget.exe .

- If you're using NuGet.exe 5.11.2 or lower, you should download and install 5.11.3 from https://dist.nuget.org/win-x86-commandline/v5.11.3/nuget.exe .

- If you're using NuGet.exe 5.9.2 or lower, you should download and install 5.9.3 from https://dist.nuget.org/win-x86-commandline/v5.9.3/nuget.exe .

- If you're using NuGet.exe 5.7.2 or lower, you should download and install 5.7.3 from https://dist.nuget.org/win-x86-commandline/v5.7.3/nuget.exe .

- If you're using NuGet.exe 4.9.5 or lower, you should download and install 4.9.6 from https://dist.nuget.org/win-x86-commandline/v4.9.6/nuget.exe .

- If you're using .NET Core 6.0, you should download and install Runtime 6.0.10 or SDK 6.0.110 (for Visual Studio 2022 v17.0) or SDK 6.0.402 (for Visual Studio 2022 v17.3) from https://dotnet.microsoft.com/download/dotnet-core/6.0.

- If you're using .NET Core 3.1, you should download and install Runtime 3.1.30 or SDK 3.1.424 (for Visual Studio 2019 v16.9 or Visual Studio 2019 v16.11 or Visual Studio 2022 v17.0 or Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/3.1.

.NET 6.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.

## Other details

Announcement for this issue can be found at https://github.com/NuGet/Announcements/issues/65

MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-41032
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41032.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-41032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-41032
reference_id
reference_type
scores
0
value 0.18296
scoring_system epss
scoring_elements 0.9522
published_at 2026-04-16T12:55:00Z
1
value 0.18296
scoring_system epss
scoring_elements 0.95212
published_at 2026-04-13T12:55:00Z
2
value 0.18296
scoring_system epss
scoring_elements 0.95209
published_at 2026-04-12T12:55:00Z
3
value 0.18296
scoring_system epss
scoring_elements 0.95203
published_at 2026-04-09T12:55:00Z
4
value 0.18296
scoring_system epss
scoring_elements 0.95187
published_at 2026-04-02T12:55:00Z
5
value 0.18296
scoring_system epss
scoring_elements 0.95199
published_at 2026-04-08T12:55:00Z
6
value 0.18296
scoring_system epss
scoring_elements 0.95188
published_at 2026-04-04T12:55:00Z
7
value 0.18296
scoring_system epss
scoring_elements 0.95192
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-41032
2
reference_url https://github.com/NuGet/Announcements/issues/65
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/Announcements/issues/65
3
reference_url https://github.com/NuGet/NuGet.Client
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client
4
reference_url https://github.com/NuGet/NuGet.Client/commit/6392863cf83f4870e18f1d02f2463cca633e59ed
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/commit/6392863cf83f4870e18f1d02f2463cca633e59ed
5
reference_url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-g3q9-xf95-8hp5
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FOG35Z5RL5W5RGLLYLN46CI4D2UPDSWM
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HDPT2MJC3HD7HYZGASOOX6MTDR4ASBL5
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X7BMHO5ITRBZREVTEKHQRGSFRPDMALV3
12
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-28T20:23:59Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41032
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-41032
14
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41032
15
reference_url https://www.edwardthomson.com/blog/my-first-cve.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.edwardthomson.com/blog/my-first-cve.html
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2132614
reference_id 2132614
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2132614
17
reference_url https://github.com/advisories/GHSA-g3q9-xf95-8hp5
reference_id GHSA-g3q9-xf95-8hp5
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g3q9-xf95-8hp5
18
reference_url https://access.redhat.com/errata/RHSA-2022:6911
reference_id RHSA-2022:6911
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6911
19
reference_url https://access.redhat.com/errata/RHSA-2022:6912
reference_id RHSA-2022:6912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6912
20
reference_url https://access.redhat.com/errata/RHSA-2022:6913
reference_id RHSA-2022:6913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6913
21
reference_url https://access.redhat.com/errata/RHSA-2022:6914
reference_id RHSA-2022:6914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6914
22
reference_url https://access.redhat.com/errata/RHSA-2022:6915
reference_id RHSA-2022:6915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6915
23
reference_url https://access.redhat.com/errata/RHSA-2022:7826
reference_id RHSA-2022:7826
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7826
24
reference_url https://access.redhat.com/errata/RHSA-2022:8434
reference_id RHSA-2022:8434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8434
25
reference_url https://usn.ubuntu.com/5670-1/
reference_id USN-5670-1
reference_type
scores
url https://usn.ubuntu.com/5670-1/
fixed_packages
0
url pkg:nuget/NuGet.Commands@4.9.6
purl pkg:nuget/NuGet.Commands@4.9.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@4.9.6
1
url pkg:nuget/NuGet.Commands@5.7.3
purl pkg:nuget/NuGet.Commands@5.7.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@5.7.3
2
url pkg:nuget/NuGet.Commands@5.9.3
purl pkg:nuget/NuGet.Commands@5.9.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yp6p-q3tf-5qb7
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@5.9.3
3
url pkg:nuget/NuGet.Commands@5.11.3
purl pkg:nuget/NuGet.Commands@5.11.3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yp6p-q3tf-5qb7
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@5.11.3
4
url pkg:nuget/NuGet.Commands@6.0.3
purl pkg:nuget/NuGet.Commands@6.0.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.0.3
5
url pkg:nuget/NuGet.Commands@6.2.2
purl pkg:nuget/NuGet.Commands@6.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yp6p-q3tf-5qb7
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.2.2
6
url pkg:nuget/NuGet.Commands@6.3.1
purl pkg:nuget/NuGet.Commands@6.3.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-yp6p-q3tf-5qb7
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.3.1
aliases CVE-2022-41032, GHSA-g3q9-xf95-8hp5
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5fx1-z4cb-hyd8
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Commands@6.3.1