Search for vulnerabilities
Vulnerability details: VCID-9bfk-6rd5-1qfk
System Score Found at
cvssv3 8.1 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33170.json
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
epss 0.00225 https://api.first.org/data/v1/epss?cve=CVE-2023-33170
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-25c8-p796-jg6r
cvssv3.1 8.1 https://github.com/dotnet/aspnetcore
generic_textual HIGH https://github.com/dotnet/aspnetcore
cvssv3.1 8.1 https://github.com/dotnet/aspnetcore/issues/49334
generic_textual HIGH https://github.com/dotnet/aspnetcore/issues/49334
cvssv3.1 8.1 https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r
cvssv3.1_qr HIGH https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r
generic_textual HIGH https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG
cvssv3.1 8.1 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL
generic_textual HIGH https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL
cvssv3.1 8.1 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170
generic_textual HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170
cvssv3.1 8.1 https://nvd.nist.gov/vuln/detail/CVE-2023-33170
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-33170
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33170.json
https://api.first.org/data/v1/epss?cve=CVE-2023-33170
https://github.com/dotnet/aspnetcore
https://github.com/dotnet/aspnetcore/issues/49334
https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170
https://nvd.nist.gov/vuln/detail/CVE-2023-33170
2221854 https://bugzilla.redhat.com/show_bug.cgi?id=2221854
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
GHSA-25c8-p796-jg6r https://github.com/advisories/GHSA-25c8-p796-jg6r
RHSA-2023:4057 https://access.redhat.com/errata/RHSA-2023:4057
RHSA-2023:4058 https://access.redhat.com/errata/RHSA-2023:4058
RHSA-2023:4059 https://access.redhat.com/errata/RHSA-2023:4059
RHSA-2023:4060 https://access.redhat.com/errata/RHSA-2023:4060
RHSA-2023:4061 https://access.redhat.com/errata/RHSA-2023:4061
RHSA-2023:4448 https://access.redhat.com/errata/RHSA-2023:4448
RHSA-2023:4449 https://access.redhat.com/errata/RHSA-2023:4449
USN-6217-1 https://usn.ubuntu.com/6217-1/
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33170.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/aspnetcore
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/aspnetcore/issues/49334
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/aspnetcore/security/advisories/GHSA-25c8-p796-jg6r
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVZVMMCCBBCSCPAW2CRQGOTKIHVFCMRO
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5CFOR6ID2HP45E7ZOGQNX76FPIWP7XR
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TLWNIIA2I6YCYVCXYBPBRSZ3UH6KILTG
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3VJRGNYJXGPF5LXUG3NL45QPK2UU6PL
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33170
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-33170
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.4522
EPSS Score 0.00225
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:40:16.105082+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.18/community.json 37.0.0