{"id":"CVE-2022-23267","details":".NET and Visual Studio Denial of Service Vulnerability","aliases":["BIT-dotnet-2022-23267","BIT-dotnet-sdk-2022-23267","BIT-powershell-2022-23267","GHSA-485p-mrj5-8w2v"],"modified":"2026-04-02T07:48:39.991210Z","published":"2022-05-10T21:15:09.853Z","related":["ALSA-2022:2199","ALSA-2022:2200","ALSA-2022:2202"],"references":[{"type":"WEB","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/"},{"type":"FIX","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotnet/core","events":[{"introduced":"0"},{"last_affected":"62bcac3998e1168f4a34b775a06d6451b5ffca7b"},{"introduced":"0"},{"last_affected":"ee849590a02cc5cd61eff18aa64bf985ec45124d"},{"introduced":"0"},{"last_affected":"5c0a0489d157ca82fca6f9b73c682f118e8c4a8a"},{"introduced":"63772e2191a750dd3cafa75914cacdb038c7520c"},{"fixed":"49121b5f7828d144a8ab2f2a147215f4d221ecad"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"5.0"},{"introduced":"0"},{"last_affected":"6.0.0-NA"},{"introduced":"0"},{"last_affected":"3.1-NA"},{"introduced":"7.0"},{"fixed":"7.0.11"}]}},{"type":"GIT","repo":"https://github.com/powershell/powershell","events":[{"introduced":"bec5c36d9da67bfcf5b88834f03b326c89f100c5"},{"fixed":"0739d311e1d3af30dc185eec8027d3c08deb92b9"}],"database_specific":{"versions":[{"introduced":"7.2"},{"fixed":"7.2.4"}]}}],"versions":["v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.1","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.14","v1.0.15","v1.0.16","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.7","v1.0.8","v1.0.9","v1.1","v1.1.0","v1.1.0-preview1","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.2","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.0.0-preview1","v2.0.0-preview2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.7-2","v2.0.9","v2.1-preview1","v2.1-preview2","v2.1-rc1","v2.1.0","v2.1.1","v2.1.11","v2.1.12","v2.1.13","v2.1.14","v2.1.2","v2.1.3","v2.1.4","v2.1.5","v2.1.6","v2.1.7","v2.1.8","v2.1.9","v2.2.0","v2.2.0-preview1","v2.2.0-preview2","v2.2.0-preview3","v2.2.1","v2.2.2","v2.2.3","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v3.0.0","v3.0.0-preview1","v3.0.0-preview2","v3.0.0-preview3","v3.0.0-preview4","v3.0.0-preview5","v3.0.0-preview6","v3.0.0-preview7","v3.0.0-preview8","v3.0.0-preview9","v3.0.0-rc1","v3.0.1","v3.1.0","v3.1.0-preview1","v3.1.0-preview2","v3.1.0-preview3","v3.1.31","v3.1.32","v6.0.11","v6.0.12","v6.0.13","v6.0.14","v6.0.15","v6.0.16","v6.0.18","v6.0.19","v6.0.20","v6.0.21","v7.0.0","v7.0.1","v7.0.10","v7.0.2","v7.0.3","v7.0.4","v7.0.5","v7.0.7","v7.0.8","v7.0.9","v7.2.0","v7.2.1","v7.2.2","v7.2.3","v8.0.0-preview.1","v8.0.0-preview.2","v8.0.0-preview.3","v8.0.0-preview.4","v8.0.0-preview.5","v8.0.0-preview.6","v8.0.0-preview.7"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"16.0"},{"fixed":"16.9.21"}]},{"events":[{"introduced":"16.10"},{"fixed":"16.11.14"}]},{"events":[{"introduced":"0"},{"last_affected":"17.0"}]},{"events":[{"introduced":"0"},{"last_affected":"17.1"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23267.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}