Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
Typenuget
Namespace
NameOPCFoundation.NetStandard.Opc.Ua
Version1.4.365.10
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.5.374.118
Latest_non_vulnerable_version1.5.374.158
Affected_by_vulnerabilities
0
url VCID-53xw-2jd2-pugg
vulnerability_id VCID-53xw-2jd2-pugg
summary
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45526
reference_id
reference_type
scores
0
value 0.00341
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-24T12:55:00Z
1
value 0.00341
scoring_system epss
scoring_elements 0.56786
published_at 2026-04-02T12:55:00Z
2
value 0.00341
scoring_system epss
scoring_elements 0.56807
published_at 2026-04-04T12:55:00Z
3
value 0.00341
scoring_system epss
scoring_elements 0.56783
published_at 2026-04-07T12:55:00Z
4
value 0.00341
scoring_system epss
scoring_elements 0.56835
published_at 2026-04-08T12:55:00Z
5
value 0.00341
scoring_system epss
scoring_elements 0.56839
published_at 2026-04-09T12:55:00Z
6
value 0.00341
scoring_system epss
scoring_elements 0.56847
published_at 2026-04-11T12:55:00Z
7
value 0.00341
scoring_system epss
scoring_elements 0.56824
published_at 2026-04-12T12:55:00Z
8
value 0.00341
scoring_system epss
scoring_elements 0.56803
published_at 2026-04-13T12:55:00Z
9
value 0.00341
scoring_system epss
scoring_elements 0.56834
published_at 2026-04-16T12:55:00Z
10
value 0.00341
scoring_system epss
scoring_elements 0.56831
published_at 2026-04-18T12:55:00Z
11
value 0.00341
scoring_system epss
scoring_elements 0.56806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45526
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-45526.pdf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T18:30:02Z/
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-45526.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-7vfh-cqpc-4267
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-7vfh-cqpc-4267
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-45526
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-45526
5
reference_url https://github.com/advisories/GHSA-7vfh-cqpc-4267
reference_id GHSA-7vfh-cqpc-4267
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vfh-cqpc-4267
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
aliases CVE-2024-45526, GHSA-7vfh-cqpc-4267
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53xw-2jd2-pugg
1
url VCID-9sgb-7afy-dbgm
vulnerability_id VCID-9sgb-7afy-dbgm
summary
Security Update for the OPC UA .NET Standard Stack
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29862
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.74156
published_at 2026-04-24T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74041
published_at 2026-04-02T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74067
published_at 2026-04-04T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74038
published_at 2026-04-07T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74071
published_at 2026-04-08T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-09T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-11T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74089
published_at 2026-04-12T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74083
published_at 2026-04-13T12:55:00Z
9
value 0.00802
scoring_system epss
scoring_elements 0.74121
published_at 2026-04-21T12:55:00Z
10
value 0.00802
scoring_system epss
scoring_elements 0.7413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29862
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-5q2v-6j86-5h9v
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-5q2v-6j86-5h9v
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29862
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29862
5
reference_url https://github.com/advisories/GHSA-5q2v-6j86-5h9v
reference_id GHSA-5q2v-6j86-5h9v
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5q2v-6j86-5h9v
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29862, GHSA-5q2v-6j86-5h9v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sgb-7afy-dbgm
2
url VCID-a85p-s3vr-w3ht
vulnerability_id VCID-a85p-s3vr-w3ht
summary
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29863
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70314
published_at 2026-04-24T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70196
published_at 2026-04-04T12:55:00Z
2
value 0.00628
scoring_system epss
scoring_elements 0.70173
published_at 2026-04-07T12:55:00Z
3
value 0.00628
scoring_system epss
scoring_elements 0.7022
published_at 2026-04-08T12:55:00Z
4
value 0.00628
scoring_system epss
scoring_elements 0.70235
published_at 2026-04-09T12:55:00Z
5
value 0.00628
scoring_system epss
scoring_elements 0.70258
published_at 2026-04-11T12:55:00Z
6
value 0.00628
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-12T12:55:00Z
7
value 0.00628
scoring_system epss
scoring_elements 0.7023
published_at 2026-04-13T12:55:00Z
8
value 0.00628
scoring_system epss
scoring_elements 0.70272
published_at 2026-04-16T12:55:00Z
9
value 0.00628
scoring_system epss
scoring_elements 0.70281
published_at 2026-04-18T12:55:00Z
10
value 0.00628
scoring_system epss
scoring_elements 0.70261
published_at 2026-04-21T12:55:00Z
11
value 0.00628
scoring_system epss
scoring_elements 0.7018
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29863
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29863
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29863
5
reference_url https://github.com/advisories/GHSA-r7pq-3x6p-7jcm
reference_id GHSA-r7pq-3x6p-7jcm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r7pq-3x6p-7jcm
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29863, GHSA-r7pq-3x6p-7jcm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a85p-s3vr-w3ht
3
url VCID-c3w3-gqx4-67cd
vulnerability_id VCID-c3w3-gqx4-67cd
summary
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29864
reference_id
reference_type
scores
0
value 0.01245
scoring_system epss
scoring_elements 0.79245
published_at 2026-04-02T12:55:00Z
1
value 0.01245
scoring_system epss
scoring_elements 0.7927
published_at 2026-04-04T12:55:00Z
2
value 0.01391
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-24T12:55:00Z
3
value 0.01391
scoring_system epss
scoring_elements 0.80327
published_at 2026-04-07T12:55:00Z
4
value 0.01391
scoring_system epss
scoring_elements 0.80356
published_at 2026-04-08T12:55:00Z
5
value 0.01391
scoring_system epss
scoring_elements 0.80367
published_at 2026-04-09T12:55:00Z
6
value 0.01391
scoring_system epss
scoring_elements 0.80385
published_at 2026-04-11T12:55:00Z
7
value 0.01391
scoring_system epss
scoring_elements 0.8037
published_at 2026-04-12T12:55:00Z
8
value 0.01391
scoring_system epss
scoring_elements 0.80364
published_at 2026-04-13T12:55:00Z
9
value 0.01391
scoring_system epss
scoring_elements 0.80393
published_at 2026-04-16T12:55:00Z
10
value 0.01391
scoring_system epss
scoring_elements 0.80395
published_at 2026-04-18T12:55:00Z
11
value 0.01391
scoring_system epss
scoring_elements 0.80399
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29864
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29864
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29864
5
reference_url https://github.com/advisories/GHSA-vhfw-v69p-crcw
reference_id GHSA-vhfw-v69p-crcw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vhfw-v69p-crcw
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29864, GHSA-vhfw-v69p-crcw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3w3-gqx4-67cd
4
url VCID-pmtm-p8gm-xkcp
vulnerability_id VCID-pmtm-p8gm-xkcp
summary
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption.
references
0
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
1
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-qm9f-c3v9-wphv
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-qm9f-c3v9-wphv
2
reference_url https://github.com/advisories/GHSA-qm9f-c3v9-wphv
reference_id GHSA-qm9f-c3v9-wphv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qm9f-c3v9-wphv
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
aliases GHSA-qm9f-c3v9-wphv
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmtm-p8gm-xkcp
5
url VCID-wbtc-7rp8-1qbq
vulnerability_id VCID-wbtc-7rp8-1qbq
summary
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.

https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31048
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61123
published_at 2026-04-24T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.6106
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61088
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61054
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61102
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61118
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61139
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61106
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61148
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61153
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61135
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31048
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/releases
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://github.com/OPCFoundation/UA-.NETStandard/releases
4
reference_url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-31048
reference_id CVE-2023-31048
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-31048
6
reference_url https://github.com/advisories/GHSA-4cvp-hr63-822j
reference_id GHSA-4cvp-hr63-822j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4cvp-hr63-822j
7
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-4cvp-hr63-822j
reference_id GHSA-4cvp-hr63-822j
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-4cvp-hr63-822j
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
aliases CVE-2023-31048, GHSA-4cvp-hr63-822j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtc-7rp8-1qbq
6
url VCID-x8yt-gmev-vqgb
vulnerability_id VCID-x8yt-gmev-vqgb
summary OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27432
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44745
published_at 2026-04-01T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44825
published_at 2026-04-02T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44846
published_at 2026-04-04T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44786
published_at 2026-04-07T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44839
published_at 2026-04-08T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-09T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44858
published_at 2026-04-11T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44827
published_at 2026-04-12T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44829
published_at 2026-04-13T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44883
published_at 2026-04-16T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44876
published_at 2026-04-18T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44809
published_at 2026-04-21T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27432
1
reference_url https://us-cert.cisa.gov/ics/advisories/icsa-21-133-03
reference_id
reference_type
scores
url https://us-cert.cisa.gov/ics/advisories/icsa-21-133-03
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27432
reference_id CVE-2021-27432
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-27432
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-yfz2-kug9-hkcy
7
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
aliases CVE-2021-27432
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8yt-gmev-vqgb
7
url VCID-yfz2-kug9-hkcy
vulnerability_id VCID-yfz2-kug9-hkcy
summary
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that
-  allows a malicious client or server to bypass the application authentication mechanism
-  and allow a connection to an untrusted peer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29865
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-24T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71217
published_at 2026-04-02T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71235
published_at 2026-04-04T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71211
published_at 2026-04-07T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71252
published_at 2026-04-08T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71267
published_at 2026-04-09T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71289
published_at 2026-04-11T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-12T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71259
published_at 2026-04-13T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71304
published_at 2026-04-16T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.7131
published_at 2026-04-18T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71288
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29865
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29865
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29865
5
reference_url https://opcfoundation.org/security
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/security
6
reference_url https://opcfoundation.org/security/
reference_id
reference_type
scores
url https://opcfoundation.org/security/
7
reference_url https://github.com/advisories/GHSA-fvxf-r9fw-49pc
reference_id GHSA-fvxf-r9fw-49pc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fvxf-r9fw-49pc
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29865, GHSA-fvxf-r9fw-49pc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfz2-kug9-hkcy
8
url VCID-yvwx-dkjv-5uag
vulnerability_id VCID-yvwx-dkjv-5uag
summary
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29866
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.74069
published_at 2026-04-24T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74022
published_at 2026-04-11T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.74004
published_at 2026-04-12T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-13T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74036
published_at 2026-04-16T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-18T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-21T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-02T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-04T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.73952
published_at 2026-04-07T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-08T12:55:00Z
11
value 0.00797
scoring_system epss
scoring_elements 0.74
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29866
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29866.pdf
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29866.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29866
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29866
5
reference_url https://github.com/advisories/GHSA-6fp8-cxc9-4fr9
reference_id GHSA-6fp8-cxc9-4fr9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6fp8-cxc9-4fr9
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29866, GHSA-6fp8-cxc9-4fr9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvwx-dkjv-5uag
Fixing_vulnerabilities
0
url VCID-df2w-9vh6-4feu
vulnerability_id VCID-df2w-9vh6-4feu
summary
Improper Certificate Validation
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29457
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32574
published_at 2026-04-24T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32739
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.3287
published_at 2026-04-02T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32905
published_at 2026-04-04T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32726
published_at 2026-04-07T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32774
published_at 2026-04-08T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.328
published_at 2026-04-09T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32801
published_at 2026-04-11T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32764
published_at 2026-04-12T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32738
published_at 2026-04-13T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32778
published_at 2026-04-16T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32755
published_at 2026-04-18T12:55:00Z
12
value 0.00132
scoring_system epss
scoring_elements 0.32725
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29457
1
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25
4
reference_url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf
5
reference_url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua
6
reference_url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/
reference_id
reference_type
scores
url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-29457
reference_id CVE-2020-29457
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-29457
8
reference_url https://github.com/advisories/GHSA-mjww-934m-h4jw
reference_id GHSA-mjww-934m-h4jw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mjww-934m-h4jw
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-x8yt-gmev-vqgb
7
vulnerability VCID-yfz2-kug9-hkcy
8
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
1
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-x8yt-gmev-vqgb
7
vulnerability VCID-yfz2-kug9-hkcy
8
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
aliases CVE-2020-29457, GHSA-mjww-934m-h4jw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-df2w-9vh6-4feu
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10