{"id":"CVE-2022-25903","details":"The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.","aliases":["GHSA-hgxq-hcrm-c5pm"],"modified":"2026-03-15T22:43:59.249612Z","published":"2022-08-24T05:15:07.377Z","references":[{"type":"ADVISORY","url":"https://github.com/locka99/opcua/pull/216"},{"type":"FIX","url":"https://security.snyk.io/vuln/SNYK-RUST-OPCUA-2988750"},{"type":"FIX","url":"https://github.com/locka99/opcua/pull/216/commits/e75dada28a40c3fefc4aeee4cdc272e1b748f8dd"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-25903.json","unresolved_ranges":[{"events":[{"introduced":"0.0.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}