Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/255860?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/255860?format=api", "purl": "pkg:conan/wolfssl@4.7.1", "type": "conan", "namespace": "", "name": "wolfssl", "version": "4.7.1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "5.6.3", "latest_non_vulnerable_version": "5.6.3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95002?format=api", "vulnerability_id": "VCID-3774-6bd4-8qcs", "summary": "wolfSSL through 5.0.0 allows an attacker to cause a denial of service and infinite loop in the client component by sending crafted traffic from a Machine-in-the-Middle (MITM) position. The root cause is that the client module accepts TLS messages that normally are only sent to TLS servers.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44718", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42779", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42877", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42816", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42867", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4288", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42901", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.42866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00206", "scoring_system": "epss", "scoring_elements": "0.4291", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44718" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/releases" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44718", "reference_id": "CVE-2021-44718", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44718" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/43503?format=api", "purl": "pkg:conan/wolfssl@5.1.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-av4q-73pk-tucd" }, { "vulnerability": "VCID-cum2-vp1j-syfc" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-mtcu-yhz9-c7b8" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.1.1" } ], "aliases": [ "CVE-2021-44718" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3774-6bd4-8qcs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95239?format=api", "vulnerability_id": "VCID-6n4g-us9a-53g4", "summary": "An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38152", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85849", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85889", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85899", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85914", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85911", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85906", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02711", "scoring_system": "epss", "scoring_elements": "0.85924", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-38152" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38152", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38152" }, { "reference_url": "https://github.com/tlspuffin/tlspuffin", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/tlspuffin/tlspuffin" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/pull/5468", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/pull/5468" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/releases" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021021", "reference_id": "1021021", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021021" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38152", "reference_id": "CVE-2022-38152", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38152" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/326810?format=api", "purl": "pkg:conan/wolfssl@5.5.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.5.1" } ], "aliases": [ "CVE-2022-38152" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6n4g-us9a-53g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13053?format=api", "vulnerability_id": "VCID-av4q-73pk-tucd", "summary": "Improper Authentication\nIn wolfSSL before 5.2.0, a TLS 1.3 server cannot properly enforce a requirement for mutual authentication. A client can simply omit the `certificate_verify` message from the handshake, and never present a certificate.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25640", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89792", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89807", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.8981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89827", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89833", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.8984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89831", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05102", "scoring_system": "epss", "scoring_elements": "0.89845", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25640" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25640" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/pull/4831", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/pull/4831" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25640", "reference_id": "CVE-2022-25640", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25640" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/46470?format=api", "purl": "pkg:conan/wolfssl@5.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-cum2-vp1j-syfc" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.2.0" } ], "aliases": [ "CVE-2022-25640" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-av4q-73pk-tucd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95185?format=api", "vulnerability_id": "VCID-cum2-vp1j-syfc", "summary": "wolfSSL before 5.4.0 allows remote attackers to cause a denial of service via DTLS because a check for return-routability can be skipped.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34293", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76437", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76466", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76448", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76494", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76499", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76493", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76533", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-34293" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34293", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34293" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.4.0-stable", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.4.0-stable" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/08/08/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016981", "reference_id": "1016981", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016981" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34293", "reference_id": "CVE-2022-34293", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-34293" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/324462?format=api", "purl": "pkg:conan/wolfssl@5.4.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.4.0" } ], "aliases": [ "CVE-2022-34293" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cum2-vp1j-syfc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10943?format=api", "vulnerability_id": "VCID-h2vp-p7fd-7bev", "summary": "Improper Handling of Exceptional Conditions\nwolfSSL does not produce a failure outcome when the serial number in an OCSP request differs from the serial number in the OCSP response.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6652", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66492", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.6654", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66561", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00513", "scoring_system": "epss", "scoring_elements": "0.66564", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-37155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37155" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991443", "reference_id": "991443", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991443" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37155", "reference_id": "CVE-2021-37155", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37155" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/37647?format=api", "purl": "pkg:conan/wolfssl@4.8.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3774-6bd4-8qcs" }, { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-av4q-73pk-tucd" }, { "vulnerability": "VCID-cum2-vp1j-syfc" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-mtcu-yhz9-c7b8" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@4.8.1" } ], "aliases": [ "CVE-2021-37155" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h2vp-p7fd-7bev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18412?format=api", "vulnerability_id": "VCID-hguq-mr6k-jqd3", "summary": "Improper Certificate Validation\nIf a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM (Input Keying Material) value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. wolfSSL recommends that TLS 1.3 client side users update the version of wolfSSL used.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3724", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29064", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28992", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.29035", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33149", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.3311", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33087", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33128", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3724" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3724", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3724" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/pull/6412", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-29T15:53:34Z/" } ], "url": "https://github.com/wolfSSL/wolfssl/pull/6412" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-29T15:53:34Z/" } ], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041699", "reference_id": "1041699", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041699" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3724", "reference_id": "CVE-2023-3724", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3724" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/58959?format=api", "purl": "pkg:conan/wolfssl@5.6.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.6.3" } ], "aliases": [ "CVE-2023-3724" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hguq-mr6k-jqd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95250?format=api", "vulnerability_id": "VCID-kksg-tc63-23bm", "summary": "In wolfSSL before 5.5.1, malicious clients can cause a buffer overflow during a TLS 1.3 handshake. This occurs when an attacker supposedly resumes a previous TLS session. During the resumption Client Hello a Hello Retry Request must be triggered. Both Client Hellos are required to contain a list of duplicate cipher suites to trigger the buffer overflow. In total, two Client Hellos have to be sent: one in the resumed session, and a second one as a response to a Hello Retry Request message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39173", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80194", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80203", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80242", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.8026", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80245", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80239", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01374", "scoring_system": "epss", "scoring_elements": "0.80269", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-39173" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39173", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39173" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T19:43:15Z/" } ], "url": "https://github.com/wolfSSL/wolfssl/releases" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T19:43:15Z/" } ], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021021", "reference_id": "1021021", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1021021" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/Oct/24", "reference_id": "24", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T19:43:15Z/" } ], "url": "http://seclists.org/fulldisclosure/2022/Oct/24" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39173", "reference_id": "CVE-2022-39173", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39173" }, { "reference_url": "http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html", "reference_id": "wolfSSL-Buffer-Overflow.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T19:43:15Z/" } ], "url": "http://packetstormsecurity.com/files/169600/wolfSSL-Buffer-Overflow.html" }, { "reference_url": "https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/", "reference_id": "wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-20T19:43:15Z/" } ], "url": "https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/326810?format=api", "purl": "pkg:conan/wolfssl@5.5.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.5.1" } ], "aliases": [ "CVE-2022-39173" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kksg-tc63-23bm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13043?format=api", "vulnerability_id": "VCID-mtcu-yhz9-c7b8", "summary": "Improper Certificate Validation\nIn wolfSSL before 5.2.0, certificate validation may be bypassed during attempted authentication by a TLS 1.3 client to a TLS 1.3 server. This occurs when the `sig_algo` field differs between the `certificate_verify` message and the certificate message.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25638", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34973", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34898", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34927", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34931", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34894", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.34871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00145", "scoring_system": "epss", "scoring_elements": "0.3491", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-25638" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25638", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25638" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/pull/4813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/wolfSSL/wolfssl/pull/4813" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25638", "reference_id": "CVE-2022-25638", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25638" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/46470?format=api", "purl": "pkg:conan/wolfssl@5.2.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-cum2-vp1j-syfc" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.2.0" } ], "aliases": [ "CVE-2022-25638" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mtcu-yhz9-c7b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95279?format=api", "vulnerability_id": "VCID-ubye-e3yx-pfbb", "summary": "In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42905", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90838", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90784", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90794", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90805", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90812", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.9082", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90819", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06142", "scoring_system": "epss", "scoring_elements": "0.90773", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42905" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42905" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "https://github.com/wolfSSL/wolfssl/releases" }, { "reference_url": "https://www.wolfssl.com/docs/security-vulnerabilities/", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "https://www.wolfssl.com/docs/security-vulnerabilities/" }, { "reference_url": "http://seclists.org/fulldisclosure/2023/Jan/11", "reference_id": "11", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "http://seclists.org/fulldisclosure/2023/Jan/11" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42905", "reference_id": "CVE-2022-42905", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42905" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.2-stable", "reference_id": "v5.5.2-stable", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.2-stable" }, { "reference_url": "https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/", "reference_id": "wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/" }, { "reference_url": "http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html", "reference_id": "wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-02T18:39:33Z/" } ], "url": "http://packetstormsecurity.com/files/170610/wolfSSL-WOLFSSL_CALLBACKS-Heap-Buffer-Over-Read.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/58959?format=api", "purl": "pkg:conan/wolfssl@5.6.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.6.3" } ], "aliases": [ "CVE-2022-42905" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ubye-e3yx-pfbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95280?format=api", "vulnerability_id": "VCID-x4tg-m9be-2yfe", "summary": "An issue was discovered in wolfSSL before 5.5.0. A fault injection attack on RAM via Rowhammer leads to ECDSA key disclosure. Users performing signing operations with private ECC keys, such as in server-side TLS connections, might leak faulty ECC signatures. These signatures can be processed via an advanced technique for ECDSA key recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to address the vulnerability.)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50516", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50543", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50498", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.50553", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00271", "scoring_system": "epss", "scoring_elements": "0.5055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.52038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.52078", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.52072", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00285", "scoring_system": "epss", "scoring_elements": "0.52055", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-42961" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42961", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42961" }, { "reference_url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.0-stable", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-14T14:43:21Z/" } ], "url": "https://github.com/wolfSSL/wolfssl/releases/tag/v5.5.0-stable" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023574", "reference_id": "1023574", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023574" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42961", "reference_id": "CVE-2022-42961", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42961" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/993987?format=api", "purl": "pkg:conan/wolfssl@5.5.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.5.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/326810?format=api", "purl": "pkg:conan/wolfssl@5.5.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@5.5.1" } ], "aliases": [ "CVE-2022-42961" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x4tg-m9be-2yfe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11027?format=api", "vulnerability_id": "VCID-yyy6-k4y2-s3ep", "summary": "Insufficient Verification of Data Authenticity\nwolfSSL incorrectly skips OCSP verification in certain situations of irrelevant response data that contains the NoCheck extension.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38597", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39884", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40059", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.39979", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40047", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.40057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4002", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00183", "scoring_system": "epss", "scoring_elements": "0.4005", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38597" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38597", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38597" }, { "reference_url": "https://www.wolfssl.com/docs/wolfssl-changelog/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.wolfssl.com/docs/wolfssl-changelog/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992174", "reference_id": "992174", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992174" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38597", "reference_id": "CVE-2021-38597", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-38597" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/37647?format=api", "purl": "pkg:conan/wolfssl@4.8.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3774-6bd4-8qcs" }, { "vulnerability": "VCID-6n4g-us9a-53g4" }, { "vulnerability": "VCID-av4q-73pk-tucd" }, { "vulnerability": "VCID-cum2-vp1j-syfc" }, { "vulnerability": "VCID-hguq-mr6k-jqd3" }, { "vulnerability": "VCID-kksg-tc63-23bm" }, { "vulnerability": "VCID-mtcu-yhz9-c7b8" }, { "vulnerability": "VCID-ubye-e3yx-pfbb" }, { "vulnerability": "VCID-x4tg-m9be-2yfe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@4.8.1" } ], "aliases": [ "CVE-2021-38597" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yyy6-k4y2-s3ep" } ], "fixing_vulnerabilities": [], "risk_score": "4.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/wolfssl@4.7.1" }