Lookup for vulnerable packages by Package URL.
| Purl | pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10 |
| Type | nuget |
| Namespace | |
| Name | OPCFoundation.NetStandard.Opc.Ua |
| Version | 1.4.365.10 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | 1.5.374.118 |
| Latest_non_vulnerable_version | 1.5.374.158 |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-53xw-2jd2-pugg |
| vulnerability_id |
VCID-53xw-2jd2-pugg |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56745 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56786 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56783 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56835 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56839 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56847 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56824 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56803 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56834 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56831 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00341 |
| scoring_system |
epss |
| scoring_elements |
0.56806 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-45526 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-45526, GHSA-7vfh-cqpc-4267
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-53xw-2jd2-pugg |
|
| 1 |
| url |
VCID-9sgb-7afy-dbgm |
| vulnerability_id |
VCID-9sgb-7afy-dbgm |
| summary |
Security Update for the OPC UA .NET Standard Stack
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74156 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74041 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74067 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74038 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74071 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74086 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74107 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74089 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74083 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.74121 |
| published_at |
2026-04-21T12:55:00Z |
|
| 10 |
| value |
0.00802 |
| scoring_system |
epss |
| scoring_elements |
0.7413 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29862 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29862, GHSA-5q2v-6j86-5h9v
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9sgb-7afy-dbgm |
|
| 2 |
| url |
VCID-a85p-s3vr-w3ht |
| vulnerability_id |
VCID-a85p-s3vr-w3ht |
| summary |
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70314 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70196 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7022 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70235 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70258 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70243 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7023 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70281 |
| published_at |
2026-04-18T12:55:00Z |
|
| 10 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.70261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00628 |
| scoring_system |
epss |
| scoring_elements |
0.7018 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29863 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29863, GHSA-r7pq-3x6p-7jcm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-a85p-s3vr-w3ht |
|
| 3 |
| url |
VCID-c3w3-gqx4-67cd |
| vulnerability_id |
VCID-c3w3-gqx4-67cd |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.79245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01245 |
| scoring_system |
epss |
| scoring_elements |
0.7927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80425 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80327 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80356 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80367 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80385 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.8037 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.01391 |
| scoring_system |
epss |
| scoring_elements |
0.80399 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29864 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29864, GHSA-vhfw-v69p-crcw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-c3w3-gqx4-67cd |
|
| 4 |
| url |
VCID-pmtm-p8gm-xkcp |
| vulnerability_id |
VCID-pmtm-p8gm-xkcp |
| summary |
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption. |
| references |
|
| fixed_packages |
|
| aliases |
GHSA-qm9f-c3v9-wphv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pmtm-p8gm-xkcp |
|
| 5 |
| url |
VCID-wbtc-7rp8-1qbq |
| vulnerability_id |
VCID-wbtc-7rp8-1qbq |
| summary |
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.
https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61123 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.6106 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61088 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61054 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61102 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61139 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61125 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61106 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61148 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61153 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00407 |
| scoring_system |
epss |
| scoring_elements |
0.61135 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-31048 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-31048, GHSA-4cvp-hr63-822j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtc-7rp8-1qbq |
|
| 6 |
| url |
VCID-x8yt-gmev-vqgb |
| vulnerability_id |
VCID-x8yt-gmev-vqgb |
| summary |
OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44745 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44825 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44846 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44786 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44839 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44841 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44858 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44827 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44829 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44883 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44876 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44809 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00222 |
| scoring_system |
epss |
| scoring_elements |
0.44723 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-27432 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-27432
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x8yt-gmev-vqgb |
|
| 7 |
| url |
VCID-yfz2-kug9-hkcy |
| vulnerability_id |
VCID-yfz2-kug9-hkcy |
| summary |
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that
- allows a malicious client or server to bypass the application authentication mechanism
- and allow a connection to an untrusted peer. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71341 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71217 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71235 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71211 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71252 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71267 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71289 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71274 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71304 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.7131 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00667 |
| scoring_system |
epss |
| scoring_elements |
0.71288 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29865 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29865, GHSA-fvxf-r9fw-49pc
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yfz2-kug9-hkcy |
|
| 8 |
| url |
VCID-yvwx-dkjv-5uag |
| vulnerability_id |
VCID-yvwx-dkjv-5uag |
| summary |
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74069 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74004 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73997 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74036 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74045 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74037 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73981 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73952 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.73986 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00797 |
| scoring_system |
epss |
| scoring_elements |
0.74 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-29866 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-29866, GHSA-6fp8-cxc9-4fr9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yvwx-dkjv-5uag |
|
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-df2w-9vh6-4feu |
| vulnerability_id |
VCID-df2w-9vh6-4feu |
| summary |
Improper Certificate Validation
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32574 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32739 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.3287 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32905 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.328 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32764 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32778 |
| published_at |
2026-04-16T12:55:00Z |
|
| 11 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32755 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32725 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-29457 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-29457, GHSA-mjww-934m-h4jw
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-df2w-9vh6-4feu |
|
|
| Risk_score | 4.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10 |