Search for vulnerabilities
Vulnerability details: VCID-ntz7-8pqm-s7de
Vulnerability ID VCID-ntz7-8pqm-s7de
Aliases CVE-2023-33126
GHSA-gh24-9qjj-mr67
Summary .NET and Visual Studio Remote Code Execution Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 7.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33126.json
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.00799 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
epss 0.01083 https://api.first.org/data/v1/epss?cve=CVE-2023-33126
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-gh24-9qjj-mr67
cvssv3.1 7.3 https://github.com/dotnet/announcements/issues/254
generic_textual HIGH https://github.com/dotnet/announcements/issues/254
cvssv3.1 7.3 https://github.com/dotnet/sdk
generic_textual HIGH https://github.com/dotnet/sdk
cvssv3.1 7.3 https://github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67
cvssv3.1_qr HIGH https://github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67
generic_textual HIGH https://github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67
cvssv3.1 7.3 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
cvssv3.1 7.3 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
generic_textual HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
ssvc Track https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
cvssv3.1 7.3 https://nvd.nist.gov/vuln/detail/CVE-2023-33126
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-33126
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-33126.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/announcements/issues/254
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/sdk
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://github.com/dotnet/sdk/security/advisories/GHSA-gh24-9qjj-mr67
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-08T14:17:17Z/ Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33126
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-33126
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.73077
EPSS Score 0.00799
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:35:20.516928+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.19/community.json 37.0.0