Search for vulnerabilities
Vulnerability details: VCID-zmvv-x9qy-2qc2
Vulnerability ID VCID-zmvv-x9qy-2qc2
Aliases CVE-2023-38178
GHSA-p57v-gv7q-4xfm
Summary .NET Core and Visual Studio Denial of Service Vulnerability
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3 7.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38178.json
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01313 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
epss 0.01774 https://api.first.org/data/v1/epss?cve=CVE-2023-38178
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-p57v-gv7q-4xfm
cvssv3.1 7.5 https://github.com/dotnet/runtime
generic_textual HIGH https://github.com/dotnet/runtime
cvssv3.1 7.5 https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm
cvssv3.1_qr HIGH https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm
generic_textual HIGH https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm
cvssv3.1 7.5 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
cvssv3.1 7.5 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
generic_textual HIGH https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
ssvc Track https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2023-38178
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2023-38178
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38178.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/runtime
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/dotnet/runtime/security/advisories/GHSA-p57v-gv7q-4xfm
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-29T18:24:24Z/ Found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38178
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-38178
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.7898
EPSS Score 0.01313
Published At Aug. 8, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:29:16.091212+00:00 Alpine Linux Importer Import https://secdb.alpinelinux.org/v3.19/community.json 37.0.0