| 0 |
| url |
VCID-2bp3-w8u8-7fe4 |
| vulnerability_id |
VCID-2bp3-w8u8-7fe4 |
| summary |
Improper Certificate Validation
Failure to validate certificates in OPC Foundation UA Client Applications communicating without security allows attackers with control over a piece of network infrastructure to decrypt passwords. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12087 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09767 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09756 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09769 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09735 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09719 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09606 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09577 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09724 |
| published_at |
2026-04-21T12:55:00Z |
|
| 8 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09616 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09681 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09732 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09636 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09707 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12087 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12087, GHSA-8336-mxp6-v5h9
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2bp3-w8u8-7fe4 |
|
| 1 |
| url |
VCID-53xw-2jd2-pugg |
| vulnerability_id |
VCID-53xw-2jd2-pugg |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56745 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56835 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56824 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56803 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56806 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45526, GHSA-7vfh-cqpc-4267
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-53xw-2jd2-pugg |
|
| 2 |
| url |
VCID-644h-mdcn-1qau |
| vulnerability_id |
VCID-644h-mdcn-1qau |
| summary |
An XXE vulnerability in the OPC UA Java and .NET Legacy Stack can allow remote attackers to trigger a denial of service. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12585 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69969 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.69961 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70025 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70048 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.7002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70063 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70072 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70053 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.0062 |
| scoring_system |
epss |
| scoring_elements |
0.70105 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12585 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12585
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-644h-mdcn-1qau |
|
| 3 |
| url |
VCID-6nd4-b64f-9kbe |
| vulnerability_id |
VCID-6nd4-b64f-9kbe |
| summary |
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
An issue was discovered in OPC UA .NET Standard Stack and Sample Code before GitHub commit, and OPC UA .NET Legacy Stack and Sample Code before GitHub commit . A vulnerability in OPC UA applications can allow a remote attacker to determine a Server's private key by sending carefully constructed bad UserIdentityTokens as part of an oracle attack. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7559 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49971 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49992 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50031 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.5003 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49987 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50015 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49997 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49933 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.50004 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49949 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00265 |
| scoring_system |
epss |
| scoring_elements |
0.49998 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7559 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2018-7559 |
| reference_id |
CVE-2018-7559 |
| reference_type |
|
| scores |
| 0 |
| value |
3.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:S/C:P/I:N/A:N |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2018-7559 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7559, GHSA-gr4c-5rq6-cgh3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6nd4-b64f-9kbe |
|
| 4 |
| url |
VCID-9sgb-7afy-dbgm |
| vulnerability_id |
VCID-9sgb-7afy-dbgm |
| summary |
Security Update for the OPC UA .NET Standard Stack
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74156 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74041 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74067 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74071 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74083 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74121 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.7413 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29862, GHSA-5q2v-6j86-5h9v
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9sgb-7afy-dbgm |
|
| 5 |
| url |
VCID-a85p-s3vr-w3ht |
| vulnerability_id |
VCID-a85p-s3vr-w3ht |
| summary |
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70314 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7022 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70235 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70281 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7018 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29863, GHSA-r7pq-3x6p-7jcm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a85p-s3vr-w3ht |
|
| 6 |
| url |
VCID-c3w3-gqx4-67cd |
| vulnerability_id |
VCID-c3w3-gqx4-67cd |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.79245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.7927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.8037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80399 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29864, GHSA-vhfw-v69p-crcw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c3w3-gqx4-67cd |
|
| 7 |
| url |
VCID-df2w-9vh6-4feu |
| vulnerability_id |
VCID-df2w-9vh6-4feu |
| summary |
Improper Certificate Validation
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32574 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32739 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3287 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32905 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32725 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-29457, GHSA-mjww-934m-h4jw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-df2w-9vh6-4feu |
|
| 8 |
| url |
VCID-e415-z3cf-ekfm |
| vulnerability_id |
VCID-e415-z3cf-ekfm |
| summary |
Out-of-bounds Write
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12086 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96258 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96254 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96245 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96244 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.9624 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96227 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.9626 |
| published_at |
2026-04-24T12:55:00Z |
|
| 10 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96259 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96223 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.25733 |
| scoring_system |
epss |
| scoring_elements |
0.96208 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-12086 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-12086, GHSA-782p-53wq-cxmj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e415-z3cf-ekfm |
|
| 9 |
| url |
VCID-hx7z-escx-guax |
| vulnerability_id |
VCID-hx7z-escx-guax |
| summary |
Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8867 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82447 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82348 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82342 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.8237 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82377 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82396 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82392 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82421 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82425 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.82316 |
| published_at |
2026-04-01T12:55:00Z |
|
| 11 |
| value |
0.01718 |
| scoring_system |
epss |
| scoring_elements |
0.8233 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8867 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8867, GHSA-9q94-v7ch-mxqw
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7z-escx-guax |
|
| 10 |
| url |
VCID-pmtm-p8gm-xkcp |
| vulnerability_id |
VCID-pmtm-p8gm-xkcp |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-qm9f-c3v9-wphv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmtm-p8gm-xkcp |
|
| 11 |
| url |
VCID-wbtc-7rp8-1qbq |
| vulnerability_id |
VCID-wbtc-7rp8-1qbq |
| summary |
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61123 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.6106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61102 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61139 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61125 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61106 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61148 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61135 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-31048, GHSA-4cvp-hr63-822j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtc-7rp8-1qbq |
|
| 12 |
| url |
VCID-x8yt-gmev-vqgb |
| vulnerability_id |
VCID-x8yt-gmev-vqgb |
| summary |
OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44745 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44825 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44839 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44841 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44858 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-27432
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8yt-gmev-vqgb |
|
| 13 |
| url |
VCID-yfz2-kug9-hkcy |
| vulnerability_id |
VCID-yfz2-kug9-hkcy |
| summary |
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that
- allows a malicious client or server to bypass the application authentication mechanism
- and allow a connection to an untrusted peer. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71341 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71217 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71235 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71252 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71289 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71304 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.7131 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71288 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29865, GHSA-fvxf-r9fw-49pc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfz2-kug9-hkcy |
|
| 14 |
| url |
VCID-yvwx-dkjv-5uag |
| vulnerability_id |
VCID-yvwx-dkjv-5uag |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74069 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74004 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74037 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73952 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73986 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29866, GHSA-6fp8-cxc9-4fr9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yvwx-dkjv-5uag |
|