| 0 |
| url |
VCID-2bp3-w8u8-7fe4 |
| vulnerability_id |
VCID-2bp3-w8u8-7fe4 |
| summary |
Improper Certificate Validation
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12087 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09692 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09735 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09606 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09577 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09724 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09767 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09733 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09616 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09681 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09732 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09707 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 14 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09769 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12087 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12087, GHSA-8336-mxp6-v5h9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2bp3-w8u8-7fe4 |
|
| 1 |
| url |
VCID-53xw-2jd2-pugg |
| vulnerability_id |
VCID-53xw-2jd2-pugg |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56746 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56835 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56824 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56803 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56806 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56745 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56763 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56807 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45526, GHSA-7vfh-cqpc-4267
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-53xw-2jd2-pugg |
|
| 2 |
| url |
VCID-644h-mdcn-1qau |
| vulnerability_id |
VCID-644h-mdcn-1qau |
| summary |
An XXE vulnerability in the OPC UA Java and .NET Legacy Stack can allow remote attackers to trigger a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12585 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69969 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69961 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70025 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70048 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70063 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70072 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70053 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70105 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70112 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12585 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12585
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-644h-mdcn-1qau |
|
| 3 |
| url |
VCID-6nd4-b64f-9kbe |
| vulnerability_id |
VCID-6nd4-b64f-9kbe |
| summary |
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit . A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49952 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49933 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49971 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49998 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49949 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50004 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49997 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49987 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.5003 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49992 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7559 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-7559 |
| reference_id |
CVE-2018-7559 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-7559 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7559, GHSA-gr4c-5rq6-cgh3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6nd4-b64f-9kbe |
|
| 4 |
| url |
VCID-9sgb-7afy-dbgm |
| vulnerability_id |
VCID-9sgb-7afy-dbgm |
| summary |
Security Update for the OPC UA .NET Standard Stack
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74164 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74071 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74083 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74121 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.7413 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74156 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74165 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74041 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74067 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29862, GHSA-5q2v-6j86-5h9v
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9sgb-7afy-dbgm |
|
| 5 |
| url |
VCID-a85p-s3vr-w3ht |
| vulnerability_id |
VCID-a85p-s3vr-w3ht |
| summary |
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7032 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7022 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70235 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70281 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 9 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70314 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70322 |
| published_at |
2026-04-26T12:55:00Z |
|
| 11 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7018 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70173 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29863, GHSA-r7pq-3x6p-7jcm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a85p-s3vr-w3ht |
|
| 6 |
| url |
VCID-c3w3-gqx4-67cd |
| vulnerability_id |
VCID-c3w3-gqx4-67cd |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.79245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.7927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80449 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.8037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80399 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80432 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80327 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29864, GHSA-vhfw-v69p-crcw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c3w3-gqx4-67cd |
|
| 7 |
| url |
VCID-df2w-9vh6-4feu |
| vulnerability_id |
VCID-df2w-9vh6-4feu |
| summary |
Improper Certificate Validation
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32375 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3287 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32905 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32725 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32574 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32458 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32739 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-29457, GHSA-mjww-934m-h4jw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-df2w-9vh6-4feu |
|
| 8 |
| url |
VCID-e415-z3cf-ekfm |
| vulnerability_id |
VCID-e415-z3cf-ekfm |
| summary |
Out-of-bounds Write
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96264 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96208 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96223 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96227 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.9624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96244 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96254 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 13 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.9626 |
| published_at |
2026-04-24T12:55:00Z |
|
| 14 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96262 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12086 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12086, GHSA-782p-53wq-cxmj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e415-z3cf-ekfm |
|
| 9 |
| url |
VCID-hx7z-escx-guax |
| vulnerability_id |
VCID-hx7z-escx-guax |
| summary |
Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8867 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82462 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.8237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82377 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82396 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82392 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82425 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82447 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82458 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82316 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.8233 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82348 |
| published_at |
2026-04-04T12:55:00Z |
|
| 13 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82342 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8867 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8867, GHSA-9q94-v7ch-mxqw
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7z-escx-guax |
|
| 10 |
| url |
VCID-pmtm-p8gm-xkcp |
| vulnerability_id |
VCID-pmtm-p8gm-xkcp |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-qm9f-c3v9-wphv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmtm-p8gm-xkcp |
|
| 11 |
| url |
VCID-wbtc-7rp8-1qbq |
| vulnerability_id |
VCID-wbtc-7rp8-1qbq |
| summary |
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61139 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.6106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61102 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61128 |
| published_at |
2026-04-29T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61136 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61123 |
| published_at |
2026-04-24T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61135 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61148 |
| published_at |
2026-04-16T12:55:00Z |
|
| 12 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61106 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61125 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-31048, GHSA-4cvp-hr63-822j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtc-7rp8-1qbq |
|
| 12 |
| url |
VCID-x8yt-gmev-vqgb |
| vulnerability_id |
VCID-x8yt-gmev-vqgb |
| summary |
OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44745 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44825 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44839 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44841 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44858 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.4473 |
| published_at |
2026-04-26T12:55:00Z |
|
| 14 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44652 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-27432
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8yt-gmev-vqgb |
|
| 13 |
| url |
VCID-yfz2-kug9-hkcy |
| vulnerability_id |
VCID-yfz2-kug9-hkcy |
| summary |
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that
- allows a malicious client or server to bypass the application authentication mechanism
- and allow a connection to an untrusted peer. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71352 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71235 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71252 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71289 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71304 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.7131 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71288 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71341 |
| published_at |
2026-04-24T12:55:00Z |
|
| 12 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71348 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71217 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29865, GHSA-fvxf-r9fw-49pc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfz2-kug9-hkcy |
|
| 14 |
| url |
VCID-yvwx-dkjv-5uag |
| vulnerability_id |
VCID-yvwx-dkjv-5uag |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74077 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74037 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74069 |
| published_at |
2026-04-24T12:55:00Z |
|
| 6 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74078 |
| published_at |
2026-04-26T12:55:00Z |
|
| 7 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73952 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73986 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74004 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29866, GHSA-6fp8-cxc9-4fr9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yvwx-dkjv-5uag |
|