Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-dotnet50-dotnet@5.0.214-1?arch=el7_9
Typerpm
Namespaceredhat
Namerh-dotnet50-dotnet
Version5.0.214-1
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7j9q-dfj7-jbgt
vulnerability_id VCID-7j9q-dfj7-jbgt
summary
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.

A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 where a malicious client can can cause a denial of service when HTML forms are parsed.

### Affected software

* Any .NET 6.0 application running on .NET 6.0.4 or earlier.
* Any .NET 5.0 application running .NET 5.0.16 or earlier.
* Any .NET Core 3.1 application running on .NET Core 3.1.24 or earlier.

#### Affected packages

**.NET Core 3.1**

| Package name                                  | Affected version | Patched version |
|---------------------------------------------------|---------------------|---------------|
| Microsoft.AspNetCore.App.Runtime.win-x64          | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-x64        | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.win-x86          | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.osx-x64          | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-x64   | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-arm64      | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-arm        | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.win-arm64        | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.win-arm          | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=3.0.0,3.1.24      | 3.1.25        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm   | >=3.0.0,3.1.24      | 3.1.25        |

**.NET 5.0**

| Package name                                  | Affected version | Patched version |
|---------------------------------------------------|---------------------|---------------|
| Microsoft.AspNetCore.App.Runtime.win-x64          | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-x64        | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.win-x86          | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.osx-x64          | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-x64   | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-arm64      | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-arm        | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.win-arm64        | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.win-arm          | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=5.0.0,5.0.16      | 5.0.17        |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm   | >=5.0.0,5.0.16      | 5.0.17        |

**.NET 6.0**

| Package name                                  | Affected version | Patched version |
|---------------------------------------------------|---------------------|---------------|
| Microsoft.AspNetCore.App.Runtime.win-x64          | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-x64        | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.win-x86          | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.osx-x64          | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-musl-x64   | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-arm64      | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-arm        | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.win-arm64        | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.win-arm          | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.osx-arm64        | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=6.0.0,6.0.4       | 6.0.5         |
| Microsoft.AspNetCore.App.Runtime.linux-musl-arm   | >=6.0.0,6.0.4       | 6.0.5         |


### Patches
* If you're using .NET Core 6.0, you should download and install Runtime 6.0.5 or SDK 6.0.105 (for Visual Studio 2022 v17.0) or SDK 6.0.203 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.

* If you're using .NET 5.0, you should download and install Runtime 5.0.17 or SDK 5.0.214 (for Visual Studio 2019 v16.9) or SDK 5.0.408 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.

* If you're using .NET Core 3.1, you should download and install Runtime 3.1.25 or SDK 3.1.419 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1.

.NET 6.0, .NET 5.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.

### Other

Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/222
An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/41609
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29145.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29145.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29145
reference_id
reference_type
scores
0
value 0.06204
scoring_system epss
scoring_elements 0.90893
published_at 2026-04-18T12:55:00Z
1
value 0.06204
scoring_system epss
scoring_elements 0.90896
published_at 2026-04-16T12:55:00Z
2
value 0.06204
scoring_system epss
scoring_elements 0.90871
published_at 2026-04-13T12:55:00Z
3
value 0.06204
scoring_system epss
scoring_elements 0.90873
published_at 2026-04-12T12:55:00Z
4
value 0.06204
scoring_system epss
scoring_elements 0.90864
published_at 2026-04-09T12:55:00Z
5
value 0.06204
scoring_system epss
scoring_elements 0.90858
published_at 2026-04-08T12:55:00Z
6
value 0.06204
scoring_system epss
scoring_elements 0.90836
published_at 2026-04-04T12:55:00Z
7
value 0.06204
scoring_system epss
scoring_elements 0.90826
published_at 2026-04-02T12:55:00Z
8
value 0.06204
scoring_system epss
scoring_elements 0.90847
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29145
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-fcg8-mg9g-6hc4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-fcg8-mg9g-6hc4
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
10
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29145
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29145
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2083649
reference_id 2083649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2083649
13
reference_url https://github.com/advisories/GHSA-fcg8-mg9g-6hc4
reference_id GHSA-fcg8-mg9g-6hc4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fcg8-mg9g-6hc4
14
reference_url https://access.redhat.com/errata/RHSA-2022:2194
reference_id RHSA-2022:2194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2194
15
reference_url https://access.redhat.com/errata/RHSA-2022:2195
reference_id RHSA-2022:2195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2195
16
reference_url https://access.redhat.com/errata/RHSA-2022:2196
reference_id RHSA-2022:2196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2196
17
reference_url https://access.redhat.com/errata/RHSA-2022:2199
reference_id RHSA-2022:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2199
18
reference_url https://access.redhat.com/errata/RHSA-2022:2200
reference_id RHSA-2022:2200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2200
19
reference_url https://access.redhat.com/errata/RHSA-2022:2202
reference_id RHSA-2022:2202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2202
20
reference_url https://access.redhat.com/errata/RHSA-2022:4588
reference_id RHSA-2022:4588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4588
fixed_packages
aliases CVE-2022-29145, GHSA-fcg8-mg9g-6hc4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7j9q-dfj7-jbgt
1
url VCID-m6bh-57h2-73a3
vulnerability_id VCID-m6bh-57h2-73a3
summary This advisory has been marked as False-Positive and removed.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29117.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29117.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29117
reference_id
reference_type
scores
0
value 0.02187
scoring_system epss
scoring_elements 0.84397
published_at 2026-04-18T12:55:00Z
1
value 0.02187
scoring_system epss
scoring_elements 0.84375
published_at 2026-04-13T12:55:00Z
2
value 0.02187
scoring_system epss
scoring_elements 0.84379
published_at 2026-04-12T12:55:00Z
3
value 0.02187
scoring_system epss
scoring_elements 0.84386
published_at 2026-04-11T12:55:00Z
4
value 0.02187
scoring_system epss
scoring_elements 0.84368
published_at 2026-04-09T12:55:00Z
5
value 0.02187
scoring_system epss
scoring_elements 0.84341
published_at 2026-04-07T12:55:00Z
6
value 0.02187
scoring_system epss
scoring_elements 0.84339
published_at 2026-04-04T12:55:00Z
7
value 0.02187
scoring_system epss
scoring_elements 0.84318
published_at 2026-04-02T12:55:00Z
8
value 0.02187
scoring_system epss
scoring_elements 0.84363
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29117
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/dotnet/aspnetcore
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore
4
reference_url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-3rq8-h3gj-r5c6
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/aspnetcore/security/advisories/GHSA-3rq8-h3gj-r5c6
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
14
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2083647
reference_id 2083647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2083647
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29117
reference_id CVE-2022-29117
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29117
17
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117
reference_id CVE-2022-29117
reference_type
scores
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117
18
reference_url https://github.com/advisories/GHSA-3rq8-h3gj-r5c6
reference_id GHSA-3rq8-h3gj-r5c6
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-3rq8-h3gj-r5c6
19
reference_url https://access.redhat.com/errata/RHSA-2022:2194
reference_id RHSA-2022:2194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2194
20
reference_url https://access.redhat.com/errata/RHSA-2022:2195
reference_id RHSA-2022:2195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2195
21
reference_url https://access.redhat.com/errata/RHSA-2022:2196
reference_id RHSA-2022:2196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2196
22
reference_url https://access.redhat.com/errata/RHSA-2022:2199
reference_id RHSA-2022:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2199
23
reference_url https://access.redhat.com/errata/RHSA-2022:2200
reference_id RHSA-2022:2200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2200
24
reference_url https://access.redhat.com/errata/RHSA-2022:2202
reference_id RHSA-2022:2202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2202
25
reference_url https://access.redhat.com/errata/RHSA-2022:4588
reference_id RHSA-2022:4588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4588
fixed_packages
aliases CVE-2022-29117, GHSA-3rq8-h3gj-r5c6
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6bh-57h2-73a3
2
url VCID-ujyg-uwtg-vqbt
vulnerability_id VCID-ujyg-uwtg-vqbt
summary
Uncontrolled Resource Consumption
.NET, Visual Studio and PowerShell Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-29117, CVE-2022-29145.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23267.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23267.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-23267
reference_id
reference_type
scores
0
value 0.08193
scoring_system epss
scoring_elements 0.92213
published_at 2026-04-18T12:55:00Z
1
value 0.08193
scoring_system epss
scoring_elements 0.92214
published_at 2026-04-16T12:55:00Z
2
value 0.08193
scoring_system epss
scoring_elements 0.92203
published_at 2026-04-13T12:55:00Z
3
value 0.08193
scoring_system epss
scoring_elements 0.922
published_at 2026-04-09T12:55:00Z
4
value 0.08193
scoring_system epss
scoring_elements 0.92197
published_at 2026-04-08T12:55:00Z
5
value 0.08193
scoring_system epss
scoring_elements 0.92186
published_at 2026-04-07T12:55:00Z
6
value 0.08193
scoring_system epss
scoring_elements 0.92182
published_at 2026-04-04T12:55:00Z
7
value 0.08193
scoring_system epss
scoring_elements 0.92176
published_at 2026-04-02T12:55:00Z
8
value 0.08193
scoring_system epss
scoring_elements 0.92206
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-23267
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/dotnet/announcements/issues/221
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/221
4
reference_url https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v
5
reference_url https://github.com/PowerShell/Announcements/issues/32
reference_id
reference_type
scores
url https://github.com/PowerShell/Announcements/issues/32
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY
12
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2083650
reference_id 2083650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2083650
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-23267
reference_id CVE-2022-23267
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-23267
15
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267
reference_id CVE-2022-23267
reference_type
scores
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267
16
reference_url https://github.com/advisories/GHSA-485p-mrj5-8w2v
reference_id GHSA-485p-mrj5-8w2v
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-485p-mrj5-8w2v
17
reference_url https://access.redhat.com/errata/RHSA-2022:2194
reference_id RHSA-2022:2194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2194
18
reference_url https://access.redhat.com/errata/RHSA-2022:2195
reference_id RHSA-2022:2195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2195
19
reference_url https://access.redhat.com/errata/RHSA-2022:2196
reference_id RHSA-2022:2196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2196
20
reference_url https://access.redhat.com/errata/RHSA-2022:2199
reference_id RHSA-2022:2199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2199
21
reference_url https://access.redhat.com/errata/RHSA-2022:2200
reference_id RHSA-2022:2200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2200
22
reference_url https://access.redhat.com/errata/RHSA-2022:2202
reference_id RHSA-2022:2202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2202
23
reference_url https://access.redhat.com/errata/RHSA-2022:4588
reference_id RHSA-2022:4588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4588
fixed_packages
aliases CVE-2022-23267, GHSA-485p-mrj5-8w2v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ujyg-uwtg-vqbt
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-dotnet50-dotnet@5.0.214-1%3Farch=el7_9