Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/wolfssl@5.7.2-r0?arch=riscv64&distroversion=v3.22&reponame=community
Typeapk
Namespacealpine
Namewolfssl
Version5.7.2-r0
Qualifiers
arch riscv64
distroversion v3.22
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1u3q-52yd-1bhe
vulnerability_id VCID-1u3q-52yd-1bhe
summary In function MatchDomainName(), input param str is treated as a NULL terminated string despite being user provided and unchecked. Specifically, the function X509_check_host() takes in a pointer and length to check against, with no requirements that it be NULL terminated. If a caller was attempting to do a name check on a non-NULL terminated buffer, the code would read beyond the bounds of the input array until it found a NULL terminator.This issue affects wolfSSL: through 5.7.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-5991
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29446
published_at 2026-04-18T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29455
published_at 2026-04-13T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29474
published_at 2026-04-16T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29577
published_at 2026-04-02T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29626
published_at 2026-04-04T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29448
published_at 2026-04-07T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.2951
published_at 2026-04-08T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.2955
published_at 2026-04-09T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.29552
published_at 2026-04-11T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29507
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-5991
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5991
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081788
reference_id 1081788
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1081788
fixed_packages
0
url pkg:apk/alpine/wolfssl@5.7.2-r0?arch=riscv64&distroversion=v3.22&reponame=community
purl pkg:apk/alpine/wolfssl@5.7.2-r0?arch=riscv64&distroversion=v3.22&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/wolfssl@5.7.2-r0%3Farch=riscv64&distroversion=v3.22&reponame=community
aliases CVE-2024-5991
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1u3q-52yd-1bhe
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/wolfssl@5.7.2-r0%3Farch=riscv64&distroversion=v3.22&reponame=community