Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
Typenuget
Namespace
NameOPCFoundation.NetStandard.Opc.Ua
Version1.4.359.31
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.5.374.118
Latest_non_vulnerable_version1.5.374.158
Affected_by_vulnerabilities
0
url VCID-53xw-2jd2-pugg
vulnerability_id VCID-53xw-2jd2-pugg
summary
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that allows an
unauthorized attacker to trigger a gradual degradation in performance.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45526
reference_id
reference_type
scores
0
value 0.00341
scoring_system epss
scoring_elements 0.56745
published_at 2026-04-24T12:55:00Z
1
value 0.00341
scoring_system epss
scoring_elements 0.56786
published_at 2026-04-02T12:55:00Z
2
value 0.00341
scoring_system epss
scoring_elements 0.56807
published_at 2026-04-04T12:55:00Z
3
value 0.00341
scoring_system epss
scoring_elements 0.56783
published_at 2026-04-07T12:55:00Z
4
value 0.00341
scoring_system epss
scoring_elements 0.56835
published_at 2026-04-08T12:55:00Z
5
value 0.00341
scoring_system epss
scoring_elements 0.56839
published_at 2026-04-09T12:55:00Z
6
value 0.00341
scoring_system epss
scoring_elements 0.56847
published_at 2026-04-11T12:55:00Z
7
value 0.00341
scoring_system epss
scoring_elements 0.56824
published_at 2026-04-12T12:55:00Z
8
value 0.00341
scoring_system epss
scoring_elements 0.56803
published_at 2026-04-13T12:55:00Z
9
value 0.00341
scoring_system epss
scoring_elements 0.56834
published_at 2026-04-16T12:55:00Z
10
value 0.00341
scoring_system epss
scoring_elements 0.56831
published_at 2026-04-18T12:55:00Z
11
value 0.00341
scoring_system epss
scoring_elements 0.56806
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45526
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-45526.pdf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-23T18:30:02Z/
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2024-45526.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-7vfh-cqpc-4267
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-7vfh-cqpc-4267
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-45526
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-45526
5
reference_url https://github.com/advisories/GHSA-7vfh-cqpc-4267
reference_id GHSA-7vfh-cqpc-4267
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-7vfh-cqpc-4267
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.118
aliases CVE-2024-45526, GHSA-7vfh-cqpc-4267
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53xw-2jd2-pugg
1
url VCID-9sgb-7afy-dbgm
vulnerability_id VCID-9sgb-7afy-dbgm
summary
Security Update for the OPC UA .NET Standard Stack
A vulnerability was discovered in OPC UA .NET Standard Stack that allows a malicious client or server to cause a peer to hang with a carefully crafted message sent during secure channel creation.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29862
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.74156
published_at 2026-04-24T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74041
published_at 2026-04-02T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74067
published_at 2026-04-04T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74038
published_at 2026-04-07T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74071
published_at 2026-04-08T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74086
published_at 2026-04-09T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74107
published_at 2026-04-11T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74089
published_at 2026-04-12T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74083
published_at 2026-04-13T12:55:00Z
9
value 0.00802
scoring_system epss
scoring_elements 0.74121
published_at 2026-04-21T12:55:00Z
10
value 0.00802
scoring_system epss
scoring_elements 0.7413
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29862
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29862.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-5q2v-6j86-5h9v
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-5q2v-6j86-5h9v
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29862
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29862
5
reference_url https://github.com/advisories/GHSA-5q2v-6j86-5h9v
reference_id GHSA-5q2v-6j86-5h9v
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5q2v-6j86-5h9v
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29862, GHSA-5q2v-6j86-5h9v
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9sgb-7afy-dbgm
2
url VCID-a85p-s3vr-w3ht
vulnerability_id VCID-a85p-s3vr-w3ht
summary
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29863
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70314
published_at 2026-04-24T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70196
published_at 2026-04-04T12:55:00Z
2
value 0.00628
scoring_system epss
scoring_elements 0.70173
published_at 2026-04-07T12:55:00Z
3
value 0.00628
scoring_system epss
scoring_elements 0.7022
published_at 2026-04-08T12:55:00Z
4
value 0.00628
scoring_system epss
scoring_elements 0.70235
published_at 2026-04-09T12:55:00Z
5
value 0.00628
scoring_system epss
scoring_elements 0.70258
published_at 2026-04-11T12:55:00Z
6
value 0.00628
scoring_system epss
scoring_elements 0.70243
published_at 2026-04-12T12:55:00Z
7
value 0.00628
scoring_system epss
scoring_elements 0.7023
published_at 2026-04-13T12:55:00Z
8
value 0.00628
scoring_system epss
scoring_elements 0.70272
published_at 2026-04-16T12:55:00Z
9
value 0.00628
scoring_system epss
scoring_elements 0.70281
published_at 2026-04-18T12:55:00Z
10
value 0.00628
scoring_system epss
scoring_elements 0.70261
published_at 2026-04-21T12:55:00Z
11
value 0.00628
scoring_system epss
scoring_elements 0.7018
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29863
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29863.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29863
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29863
5
reference_url https://github.com/advisories/GHSA-r7pq-3x6p-7jcm
reference_id GHSA-r7pq-3x6p-7jcm
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r7pq-3x6p-7jcm
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29863, GHSA-r7pq-3x6p-7jcm
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a85p-s3vr-w3ht
3
url VCID-c3w3-gqx4-67cd
vulnerability_id VCID-c3w3-gqx4-67cd
summary
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29864
reference_id
reference_type
scores
0
value 0.01245
scoring_system epss
scoring_elements 0.79245
published_at 2026-04-02T12:55:00Z
1
value 0.01245
scoring_system epss
scoring_elements 0.7927
published_at 2026-04-04T12:55:00Z
2
value 0.01391
scoring_system epss
scoring_elements 0.80425
published_at 2026-04-24T12:55:00Z
3
value 0.01391
scoring_system epss
scoring_elements 0.80327
published_at 2026-04-07T12:55:00Z
4
value 0.01391
scoring_system epss
scoring_elements 0.80356
published_at 2026-04-08T12:55:00Z
5
value 0.01391
scoring_system epss
scoring_elements 0.80367
published_at 2026-04-09T12:55:00Z
6
value 0.01391
scoring_system epss
scoring_elements 0.80385
published_at 2026-04-11T12:55:00Z
7
value 0.01391
scoring_system epss
scoring_elements 0.8037
published_at 2026-04-12T12:55:00Z
8
value 0.01391
scoring_system epss
scoring_elements 0.80364
published_at 2026-04-13T12:55:00Z
9
value 0.01391
scoring_system epss
scoring_elements 0.80393
published_at 2026-04-16T12:55:00Z
10
value 0.01391
scoring_system epss
scoring_elements 0.80395
published_at 2026-04-18T12:55:00Z
11
value 0.01391
scoring_system epss
scoring_elements 0.80399
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29864
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29864.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29864
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29864
5
reference_url https://github.com/advisories/GHSA-vhfw-v69p-crcw
reference_id GHSA-vhfw-v69p-crcw
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vhfw-v69p-crcw
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29864, GHSA-vhfw-v69p-crcw
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c3w3-gqx4-67cd
4
url VCID-df2w-9vh6-4feu
vulnerability_id VCID-df2w-9vh6-4feu
summary
Improper Certificate Validation
A Privilege Elevation vulnerability in OPC UA .NET Standard Stack 1.4.363.107 could allow a rogue application to establish a secure connection.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29457
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32574
published_at 2026-04-24T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32739
published_at 2026-04-01T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.3287
published_at 2026-04-02T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32905
published_at 2026-04-04T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32726
published_at 2026-04-07T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32774
published_at 2026-04-08T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.328
published_at 2026-04-09T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32801
published_at 2026-04-11T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32764
published_at 2026-04-12T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32738
published_at 2026-04-13T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32778
published_at 2026-04-16T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32755
published_at 2026-04-18T12:55:00Z
12
value 0.00132
scoring_system epss
scoring_elements 0.32725
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29457
1
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/pull/1229/commits/d815cfb972bd668c1b6e461f6ff97519d6b26f25
4
reference_url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-29457.pdf
5
reference_url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua
6
reference_url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/
reference_id
reference_type
scores
url https://www.nuget.org/packages/OPCFoundation.NetStandard.Opc.Ua/
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-29457
reference_id CVE-2020-29457
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-29457
8
reference_url https://github.com/advisories/GHSA-mjww-934m-h4jw
reference_id GHSA-mjww-934m-h4jw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mjww-934m-h4jw
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-x8yt-gmev-vqgb
7
vulnerability VCID-yfz2-kug9-hkcy
8
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.10
1
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-x8yt-gmev-vqgb
7
vulnerability VCID-yfz2-kug9-hkcy
8
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.23
aliases CVE-2020-29457, GHSA-mjww-934m-h4jw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-df2w-9vh6-4feu
5
url VCID-pmtm-p8gm-xkcp
vulnerability_id VCID-pmtm-p8gm-xkcp
summary
Security Update for the OPC UA .NET Standard Stack
This security update resolves a vulnerability in the OPC UA .NET Standard Stack that enables an unauthorized attacker to trigger a rapid increase in memory consumption.
references
0
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
1
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-qm9f-c3v9-wphv
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-qm9f-c3v9-wphv
2
reference_url https://github.com/advisories/GHSA-qm9f-c3v9-wphv
reference_id GHSA-qm9f-c3v9-wphv
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qm9f-c3v9-wphv
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.5.374.54
aliases GHSA-qm9f-c3v9-wphv
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pmtm-p8gm-xkcp
6
url VCID-wbtc-7rp8-1qbq
vulnerability_id VCID-wbtc-7rp8-1qbq
summary
Exposure of Sensitive Information in OPC UA .NET Standard Reference Server
This security update resolves a vulnerability in the OPC UA .NET Standard Reference Server that allows
remote attackers to send malicious requests that expose sensitive information.

https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-31048
reference_id
reference_type
scores
0
value 0.00407
scoring_system epss
scoring_elements 0.61123
published_at 2026-04-24T12:55:00Z
1
value 0.00407
scoring_system epss
scoring_elements 0.6106
published_at 2026-04-02T12:55:00Z
2
value 0.00407
scoring_system epss
scoring_elements 0.61088
published_at 2026-04-04T12:55:00Z
3
value 0.00407
scoring_system epss
scoring_elements 0.61054
published_at 2026-04-07T12:55:00Z
4
value 0.00407
scoring_system epss
scoring_elements 0.61102
published_at 2026-04-08T12:55:00Z
5
value 0.00407
scoring_system epss
scoring_elements 0.61118
published_at 2026-04-09T12:55:00Z
6
value 0.00407
scoring_system epss
scoring_elements 0.61139
published_at 2026-04-11T12:55:00Z
7
value 0.00407
scoring_system epss
scoring_elements 0.61125
published_at 2026-04-12T12:55:00Z
8
value 0.00407
scoring_system epss
scoring_elements 0.61106
published_at 2026-04-13T12:55:00Z
9
value 0.00407
scoring_system epss
scoring_elements 0.61148
published_at 2026-04-16T12:55:00Z
10
value 0.00407
scoring_system epss
scoring_elements 0.61153
published_at 2026-04-18T12:55:00Z
11
value 0.00407
scoring_system epss
scoring_elements 0.61135
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-31048
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2023-31048.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/releases
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://github.com/OPCFoundation/UA-.NETStandard/releases
4
reference_url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-06T16:41:59Z/
url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.371.86
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-31048
reference_id CVE-2023-31048
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-31048
6
reference_url https://github.com/advisories/GHSA-4cvp-hr63-822j
reference_id GHSA-4cvp-hr63-822j
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-4cvp-hr63-822j
7
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-4cvp-hr63-822j
reference_id GHSA-4cvp-hr63-822j
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-4cvp-hr63-822j
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.371.86
aliases CVE-2023-31048, GHSA-4cvp-hr63-822j
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbtc-7rp8-1qbq
7
url VCID-x8yt-gmev-vqgb
vulnerability_id VCID-x8yt-gmev-vqgb
summary OPC Foundation UA .NET Standard versions prior to 1.4.365.48 and OPC UA .NET Legacy are vulnerable to an uncontrolled recursion, which may allow an attacker to trigger a stack overflow.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27432
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44745
published_at 2026-04-01T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44825
published_at 2026-04-02T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44846
published_at 2026-04-04T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44786
published_at 2026-04-07T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44839
published_at 2026-04-08T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44841
published_at 2026-04-09T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.44858
published_at 2026-04-11T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44827
published_at 2026-04-12T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44829
published_at 2026-04-13T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44883
published_at 2026-04-16T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44876
published_at 2026-04-18T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44809
published_at 2026-04-21T12:55:00Z
12
value 0.00222
scoring_system epss
scoring_elements 0.44723
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27432
1
reference_url https://us-cert.cisa.gov/ics/advisories/icsa-21-133-03
reference_id
reference_type
scores
url https://us-cert.cisa.gov/ics/advisories/icsa-21-133-03
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27432
reference_id CVE-2021-27432
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-27432
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-pmtm-p8gm-xkcp
5
vulnerability VCID-wbtc-7rp8-1qbq
6
vulnerability VCID-yfz2-kug9-hkcy
7
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.365.48
aliases CVE-2021-27432
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8yt-gmev-vqgb
8
url VCID-yfz2-kug9-hkcy
vulnerability_id VCID-yfz2-kug9-hkcy
summary
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that
-  allows a malicious client or server to bypass the application authentication mechanism
-  and allow a connection to an untrusted peer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29865
reference_id
reference_type
scores
0
value 0.00667
scoring_system epss
scoring_elements 0.71341
published_at 2026-04-24T12:55:00Z
1
value 0.00667
scoring_system epss
scoring_elements 0.71217
published_at 2026-04-02T12:55:00Z
2
value 0.00667
scoring_system epss
scoring_elements 0.71235
published_at 2026-04-04T12:55:00Z
3
value 0.00667
scoring_system epss
scoring_elements 0.71211
published_at 2026-04-07T12:55:00Z
4
value 0.00667
scoring_system epss
scoring_elements 0.71252
published_at 2026-04-08T12:55:00Z
5
value 0.00667
scoring_system epss
scoring_elements 0.71267
published_at 2026-04-09T12:55:00Z
6
value 0.00667
scoring_system epss
scoring_elements 0.71289
published_at 2026-04-11T12:55:00Z
7
value 0.00667
scoring_system epss
scoring_elements 0.71274
published_at 2026-04-12T12:55:00Z
8
value 0.00667
scoring_system epss
scoring_elements 0.71259
published_at 2026-04-13T12:55:00Z
9
value 0.00667
scoring_system epss
scoring_elements 0.71304
published_at 2026-04-16T12:55:00Z
10
value 0.00667
scoring_system epss
scoring_elements 0.7131
published_at 2026-04-18T12:55:00Z
11
value 0.00667
scoring_system epss
scoring_elements 0.71288
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29865
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29865.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29865
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29865
5
reference_url https://opcfoundation.org/security
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/security
6
reference_url https://opcfoundation.org/security/
reference_id
reference_type
scores
url https://opcfoundation.org/security/
7
reference_url https://github.com/advisories/GHSA-fvxf-r9fw-49pc
reference_id GHSA-fvxf-r9fw-49pc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-fvxf-r9fw-49pc
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29865, GHSA-fvxf-r9fw-49pc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfz2-kug9-hkcy
9
url VCID-yvwx-dkjv-5uag
vulnerability_id VCID-yvwx-dkjv-5uag
summary
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-29866
reference_id
reference_type
scores
0
value 0.00797
scoring_system epss
scoring_elements 0.74069
published_at 2026-04-24T12:55:00Z
1
value 0.00797
scoring_system epss
scoring_elements 0.74022
published_at 2026-04-11T12:55:00Z
2
value 0.00797
scoring_system epss
scoring_elements 0.74004
published_at 2026-04-12T12:55:00Z
3
value 0.00797
scoring_system epss
scoring_elements 0.73997
published_at 2026-04-13T12:55:00Z
4
value 0.00797
scoring_system epss
scoring_elements 0.74036
published_at 2026-04-16T12:55:00Z
5
value 0.00797
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-18T12:55:00Z
6
value 0.00797
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-21T12:55:00Z
7
value 0.00797
scoring_system epss
scoring_elements 0.73955
published_at 2026-04-02T12:55:00Z
8
value 0.00797
scoring_system epss
scoring_elements 0.73981
published_at 2026-04-04T12:55:00Z
9
value 0.00797
scoring_system epss
scoring_elements 0.73952
published_at 2026-04-07T12:55:00Z
10
value 0.00797
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-08T12:55:00Z
11
value 0.00797
scoring_system epss
scoring_elements 0.74
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-29866
1
reference_url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29866.pdf
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022-29866.pdf
2
reference_url https://github.com/OPCFoundation/UA-.NETStandard
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard
3
reference_url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-29866
reference_id
reference_type
scores
0
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-29866
5
reference_url https://github.com/advisories/GHSA-6fp8-cxc9-4fr9
reference_id GHSA-6fp8-cxc9-4fr9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6fp8-cxc9-4fr9
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-pmtm-p8gm-xkcp
2
vulnerability VCID-wbtc-7rp8-1qbq
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.368.58
aliases CVE-2022-29866, GHSA-6fp8-cxc9-4fr9
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvwx-dkjv-5uag
Fixing_vulnerabilities
0
url VCID-hx7z-escx-guax
vulnerability_id VCID-hx7z-escx-guax
summary
Insufficient Session Expiration and TOCTOU Race Condition in OPC FOundation UA .Net Standard
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of OPC Foundation UA .NET Standard 1.04.358.30. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of sessions. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this vulnerability to create a denial-of-service condition against the application. Was ZDI-CAN-10295.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-8867
reference_id
reference_type
scores
0
value 0.01718
scoring_system epss
scoring_elements 0.82447
published_at 2026-04-24T12:55:00Z
1
value 0.01718
scoring_system epss
scoring_elements 0.82348
published_at 2026-04-04T12:55:00Z
2
value 0.01718
scoring_system epss
scoring_elements 0.82342
published_at 2026-04-07T12:55:00Z
3
value 0.01718
scoring_system epss
scoring_elements 0.8237
published_at 2026-04-08T12:55:00Z
4
value 0.01718
scoring_system epss
scoring_elements 0.82377
published_at 2026-04-09T12:55:00Z
5
value 0.01718
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-11T12:55:00Z
6
value 0.01718
scoring_system epss
scoring_elements 0.82392
published_at 2026-04-12T12:55:00Z
7
value 0.01718
scoring_system epss
scoring_elements 0.82387
published_at 2026-04-13T12:55:00Z
8
value 0.01718
scoring_system epss
scoring_elements 0.82421
published_at 2026-04-18T12:55:00Z
9
value 0.01718
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-21T12:55:00Z
10
value 0.01718
scoring_system epss
scoring_elements 0.82316
published_at 2026-04-01T12:55:00Z
11
value 0.01718
scoring_system epss
scoring_elements 0.8233
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-8867
1
reference_url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/OPCFoundation/UA-.NETStandard/releases/tag/1.4.359.31
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-8867
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-8867
3
reference_url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2020-8867.pdf
4
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-536
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.zerodayinitiative.com/advisories/ZDI-20-536
5
reference_url https://www.zerodayinitiative.com/advisories/ZDI-20-536/
reference_id
reference_type
scores
url https://www.zerodayinitiative.com/advisories/ZDI-20-536/
6
reference_url https://github.com/advisories/GHSA-9q94-v7ch-mxqw
reference_id GHSA-9q94-v7ch-mxqw
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9q94-v7ch-mxqw
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.358.31
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.358.31
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.358.31
1
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-df2w-9vh6-4feu
5
vulnerability VCID-pmtm-p8gm-xkcp
6
vulnerability VCID-wbtc-7rp8-1qbq
7
vulnerability VCID-x8yt-gmev-vqgb
8
vulnerability VCID-yfz2-kug9-hkcy
9
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
aliases CVE-2020-8867, GHSA-9q94-v7ch-mxqw
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hx7z-escx-guax
1
url VCID-u3xw-vnkf-rudu
vulnerability_id VCID-u3xw-vnkf-rudu
summary
Insufficient Nonce Validation in Eclipse Milo Client
### Impact
Credential replay affecting those connected to a server when *all 3* of the following conditions are met:
- `SecurityPolicy` is `None`
- using username/password or X509-based authentication
- the server has a defect causing it to send null/empty or zeroed nonces 

### Patches
The problem has been patched in version `0.3.6`. A more relaxed treatment of validation as agreed upon by the OPC UA Security Working Group is implemented in version `0.3.7`.

### Workarounds
Do not use username/password or X509-based authentication with `SecurityPolicy` of `None`.

### References
https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf

### For more information
If you have any questions or comments about this advisory:
* Open an issue at [https://github.com/eclipse/milo/issues](https://github.com/eclipse/milo/issues)
* Email [the mailing list](mailto:milo-dev@eclipse.org)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19135
reference_id
reference_type
scores
0
value 0.00264
scoring_system epss
scoring_elements 0.49753
published_at 2026-04-24T12:55:00Z
1
value 0.00264
scoring_system epss
scoring_elements 0.49692
published_at 2026-04-01T12:55:00Z
2
value 0.00264
scoring_system epss
scoring_elements 0.49729
published_at 2026-04-02T12:55:00Z
3
value 0.00264
scoring_system epss
scoring_elements 0.49757
published_at 2026-04-09T12:55:00Z
4
value 0.00264
scoring_system epss
scoring_elements 0.49708
published_at 2026-04-07T12:55:00Z
5
value 0.00264
scoring_system epss
scoring_elements 0.49763
published_at 2026-04-08T12:55:00Z
6
value 0.00264
scoring_system epss
scoring_elements 0.49775
published_at 2026-04-11T12:55:00Z
7
value 0.00264
scoring_system epss
scoring_elements 0.49747
published_at 2026-04-12T12:55:00Z
8
value 0.00264
scoring_system epss
scoring_elements 0.49749
published_at 2026-04-13T12:55:00Z
9
value 0.00264
scoring_system epss
scoring_elements 0.49795
published_at 2026-04-18T12:55:00Z
10
value 0.00264
scoring_system epss
scoring_elements 0.49768
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19135
1
reference_url https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse/milo/commit/cac0e710bf2b8bed9c602fc597e9de1d8903abed
2
reference_url https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/eclipse/milo/security/advisories/GHSA-pq4w-qm9g-qx68
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19135
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19135
4
reference_url https://opcfoundation.org/security-bulletins
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/security-bulletins
5
reference_url https://opcfoundation.org/security-bulletins/
reference_id
reference_type
scores
url https://opcfoundation.org/security-bulletins/
6
reference_url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2019-19135.pdf
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opcfoundation:netstandard.opc.ua:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opcfoundation:netstandard.opc.ua:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opcfoundation:netstandard.opc.ua:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opcfoundation:ua-.netstandard:1.4.357.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:opcfoundation:ua-.netstandard:1.4.357.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:opcfoundation:ua-.netstandard:1.4.357.28:*:*:*:*:*:*:*
9
reference_url https://github.com/advisories/GHSA-pq4w-qm9g-qx68
reference_id GHSA-pq4w-qm9g-qx68
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pq4w-qm9g-qx68
fixed_packages
0
url pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
purl pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-53xw-2jd2-pugg
1
vulnerability VCID-9sgb-7afy-dbgm
2
vulnerability VCID-a85p-s3vr-w3ht
3
vulnerability VCID-c3w3-gqx4-67cd
4
vulnerability VCID-df2w-9vh6-4feu
5
vulnerability VCID-pmtm-p8gm-xkcp
6
vulnerability VCID-wbtc-7rp8-1qbq
7
vulnerability VCID-x8yt-gmev-vqgb
8
vulnerability VCID-yfz2-kug9-hkcy
9
vulnerability VCID-yvwx-dkjv-5uag
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31
aliases CVE-2019-19135, GHSA-pq4w-qm9g-qx68
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u3xw-vnkf-rudu
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/OPCFoundation.NetStandard.Opc.Ua@1.4.359.31