| 0 |
| url |
VCID-2ry7-trrg-gfdk |
| vulnerability_id |
VCID-2ry7-trrg-gfdk |
| summary |
Out-of-bounds read in ALPN parsing due to incomplete validation. wolfSSL 5.8.4 and earlier contained an out-of-bounds read in ALPN handling when built with ALPN enabled (HAVE_ALPN / --enable-alpn). A crafted ALPN protocol list could trigger an out-of-bounds read, leading to a potential process crash (denial of service). Note that ALPN is disabled by default, but is enabled for these 3rd party compatibility features: enable-apachehttpd, enable-bind, enable-curl, enable-haproxy, enable-hitch, enable-lighty, enable-jni, enable-nginx, enable-quic. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3547 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14078 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14188 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14329 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14393 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.142 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14282 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14336 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00046 |
| scoring_system |
epss |
| scoring_elements |
0.14244 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3547 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3547
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2ry7-trrg-gfdk |
|
| 1 |
| url |
VCID-4zda-zrq6-hbc8 |
| vulnerability_id |
VCID-4zda-zrq6-hbc8 |
| summary |
wolfSSL 5.8.4 on RISC-V RV32I architectures lacks a constant-time software implementation for 64-bit multiplication. The compiler-inserted __muldi3 subroutine executes in variable time based on operand values. This affects multiple SP math functions (sp_256_mul_9, sp_256_sqr_9, etc.), leading to a timing side-channel that may expose sensitive cryptographic data. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3579 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08539 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.0865 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08618 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08669 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08589 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08663 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0003 |
| scoring_system |
epss |
| scoring_elements |
0.08686 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3579 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3579
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4zda-zrq6-hbc8 |
|
| 2 |
| url |
VCID-6v8z-cfax-zqbh |
| vulnerability_id |
VCID-6v8z-cfax-zqbh |
| summary |
In wolfSSL 5.8.2 and earlier, a logic flaw existed in the TLS 1.2 server state machine implementation. The server could incorrectly accept the CertificateVerify message before the ClientKeyExchange message had been received. This issue affects wolfSSL before 5.8.4 (wolfSSL 5.8.2 and earlier is vulnerable, 5.8.4 is not vulnerable). In 5.8.4 wolfSSL would detect the issue later in the handshake. 5.9.0 was further hardened to catch the issue earlier in the handshake. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-2645 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08028 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08122 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.0813 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08081 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08143 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08157 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00029 |
| scoring_system |
epss |
| scoring_elements |
0.08138 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-2645 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-2645
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6v8z-cfax-zqbh |
|
| 3 |
| url |
VCID-8735-ectc-j7a3 |
| vulnerability_id |
VCID-8735-ectc-j7a3 |
| summary |
With TLS 1.2 connections a client can use any digest, specifically a weaker digest that is supported, rather than those in the CertificateRequest. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-12889 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03483 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03507 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03556 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.0357 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03581 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03583 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03605 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03562 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00016 |
| scoring_system |
epss |
| scoring_elements |
0.03533 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-12889 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-12889
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8735-ectc-j7a3 |
|
| 4 |
| url |
VCID-9jpj-dfsf-qkce |
| vulnerability_id |
VCID-9jpj-dfsf-qkce |
| summary |
Integer underflow in wolfSSL packet sniffer <= 5.8.4 allows an attacker to cause a buffer overflow in the AEAD decryption path by injecting a TLS record shorter than the explicit IV plus authentication tag into traffic inspected by ssl_DecodePacket. The underflow wraps a 16-bit length to a large value that is passed to AEAD decryption routines, causing heap buffer overflow and a crash. An unauthenticated attacker can trigger this remotely via malformed TLS Application Data records. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1005 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19906 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19928 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23856 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24035 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23968 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23985 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23941 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.23922 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00081 |
| scoring_system |
epss |
| scoring_elements |
0.24073 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-1005 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-1005
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9jpj-dfsf-qkce |
|
| 5 |
| url |
VCID-9jw2-3v9v-ruap |
| vulnerability_id |
VCID-9jw2-3v9v-ruap |
| summary |
Protection mechanism failure in wolfCrypt post-quantum implementations (ML-KEM and ML-DSA) in wolfSSL on ARM Cortex-M microcontrollers allows a physical attacker to compromise key material and/or cryptographic outcomes via induced transient faults that corrupt or redirect seed/pointer values during Keccak-based expansion. This issue affects wolfSSL (wolfCrypt): commit hash d86575c766e6e67ef93545fa69c04d6eb49400c6. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3503 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06516 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0659 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06492 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0653 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0652 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.0657 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06614 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06607 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00024 |
| scoring_system |
epss |
| scoring_elements |
0.06599 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3503 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3503
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9jw2-3v9v-ruap |
|
| 6 |
| url |
VCID-9kev-ferz-5bhr |
| vulnerability_id |
VCID-9kev-ferz-5bhr |
| summary |
Multiple constant-time implementations in wolfSSL before version 5.8.4 may be transformed into non-constant-time binary by LLVM optimizations, which can potentially result in observable timing discrepancies and lead to information disclosure through timing side-channel attacks. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13912 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05169 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05219 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05252 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05271 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05239 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06981 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06919 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00025 |
| scoring_system |
epss |
| scoring_elements |
0.06986 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-13912 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-13912
|
| risk_score |
0.5 |
| exploitability |
0.5 |
| weighted_severity |
0.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9kev-ferz-5bhr |
|
| 7 |
| url |
VCID-9x14-2t7m-1kbm |
| vulnerability_id |
VCID-9x14-2t7m-1kbm |
| summary |
Heap Overflow in TLS 1.3 ECH parsing. An integer underflow existed in ECH extension parsing logic when calculating a buffer length, which resulted in writing beyond the bounds of an allocated buffer. Note that in wolfSSL, ECH is off by default, and the ECH standard is still evolving. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3549 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20783 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20793 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20959 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.21017 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20734 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20873 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20889 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00067 |
| scoring_system |
epss |
| scoring_elements |
0.20845 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3549 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3549
|
| risk_score |
3.8 |
| exploitability |
0.5 |
| weighted_severity |
7.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9x14-2t7m-1kbm |
|
| 8 |
| url |
VCID-cxhw-3w24-dkes |
| vulnerability_id |
VCID-cxhw-3w24-dkes |
| summary |
The server previously verified the TLS 1.3 PSK binder using a non-constant time method which could potentially leak information about the PSK binder |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02473 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02488 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02486 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02499 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02502 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02523 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.025 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.0249 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11932 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11932
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cxhw-3w24-dkes |
|
| 9 |
| url |
VCID-f57c-kamk-3bct |
| vulnerability_id |
VCID-f57c-kamk-3bct |
| summary |
1-byte OOB heap read in wc_PKCS7_DecodeEnvelopedData via zero-length encrypted content. A vulnerability existed in wolfSSL 5.8.4 and earlier, where a 1-byte out-of-bounds heap read in wc_PKCS7_DecodeEnvelopedData could be triggered by a crafted CMS EnvelopedData message with zero-length encrypted content. Note that PKCS7 support is disabled by default. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-4159 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04873 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04924 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04883 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04908 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04927 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04963 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04979 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04961 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00019 |
| scoring_system |
epss |
| scoring_elements |
0.04942 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-4159 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-4159
|
| risk_score |
0.6 |
| exploitability |
0.5 |
| weighted_severity |
1.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-f57c-kamk-3bct |
|
| 10 |
| url |
VCID-fmtp-x6y7-83g1 |
| vulnerability_id |
VCID-fmtp-x6y7-83g1 |
| summary |
Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3548 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05491 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05537 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05511 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05441 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05475 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05479 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0002 |
| scoring_system |
epss |
| scoring_elements |
0.05516 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3548 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3548
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fmtp-x6y7-83g1 |
|
| 11 |
| url |
VCID-gcfd-w8je-kqfm |
| vulnerability_id |
VCID-gcfd-w8je-kqfm |
| summary |
With TLS 1.3 pre-shared key (PSK) a malicious or faulty server could ignore the request for PFS (perfect forward secrecy) and the client would continue on with the connection using PSK without PFS. This happened when a server responded to a ClientHello containing psk_dhe_ke without a key_share extension. The re-use of an authenticated PSK connection that on the clients side unexpectedly did not have PFS, reduces the security of the connection. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11935 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01393 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01408 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01401 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01399 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01404 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01414 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00011 |
| scoring_system |
epss |
| scoring_elements |
0.01415 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11935 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/wolfSSL/wolfssl |
| reference_id |
wolfssl |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T18:43:57Z/ |
|
|
| url |
https://github.com/wolfSSL/wolfssl |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11935
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gcfd-w8je-kqfm |
|
| 12 |
| url |
VCID-gdur-h588-vbb6 |
| vulnerability_id |
VCID-gdur-h588-vbb6 |
| summary |
Improper input validation in the TLS 1.3 CertificateVerify signature algorithm negotiation in wolfSSL 5.8.2 and earlier on multiple platforms allows for downgrading the signature algorithm used. For example when a client sends ECDSA P521 as the supported signature algorithm the server previously could respond as ECDSA P256 being the accepted signature algorithm and the connection would continue with using ECDSA P256, if the client supports ECDSA P256. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11934 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03034 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03094 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.0307 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03058 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03101 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03102 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03107 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00015 |
| scoring_system |
epss |
| scoring_elements |
0.03131 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11934 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/wolfSSL/wolfssl |
| reference_id |
wolfssl |
| reference_type |
|
| scores |
| 0 |
| value |
2.1 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:22:47Z/ |
|
|
| url |
https://github.com/wolfSSL/wolfssl |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11934
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdur-h588-vbb6 |
|
| 13 |
| url |
VCID-gmdj-a1ys-tqc2 |
| vulnerability_id |
VCID-gmdj-a1ys-tqc2 |
| summary |
Stack Buffer Overflow in wc_HpkeLabeledExtract via Oversized ECH Config. A vulnerability existed in wolfSSL 5.8.4 ECH (Encrypted Client Hello) support, where a maliciously crafted ECH config could cause a stack buffer overflow on the client side, leading to potential remote execution and client program crash. This could be exploited by a malicious TLS server supporting ECH. Note that ECH is off by default, and is only enabled with enable-ech. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3849 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.42019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.4197 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.41985 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.42012 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.41938 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.41989 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.42 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.42022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00199 |
| scoring_system |
epss |
| scoring_elements |
0.41984 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3849 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3849
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gmdj-a1ys-tqc2 |
|
| 14 |
| url |
VCID-h6na-nxxq-5yg9 |
| vulnerability_id |
VCID-h6na-nxxq-5yg9 |
| summary |
A stack buffer overflow vulnerability exists in wolfSSL's PKCS7 SignedData encoding functionality. In wc_PKCS7_BuildSignedAttributes(), when adding custom signed attributes, the code passes an incorrect capacity value (esd->signedAttribsCount) to EncodeAttributes() instead of the remaining available space in the fixed-size signedAttribs[7] array. When an application sets pkcs7->signedAttribsSz to a value greater than MAX_SIGNED_ATTRIBS_SZ (default 7) minus the number of default attributes already added, EncodeAttributes() writes beyond the array bounds, causing stack memory corruption. In WOLFSSL_SMALL_STACK builds, this becomes heap corruption. Exploitation requires an application that allows untrusted input to control the signedAttribs array size when calling wc_PKCS7_EncodeSignedData() or related signing functions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0819 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05908 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05944 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05879 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05912 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05904 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05942 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05981 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05962 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00022 |
| scoring_system |
epss |
| scoring_elements |
0.05953 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-0819 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-0819
|
| risk_score |
1.0 |
| exploitability |
0.5 |
| weighted_severity |
2.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h6na-nxxq-5yg9 |
|
| 15 |
| url |
VCID-hk8r-kk4v-1fa7 |
| vulnerability_id |
VCID-hk8r-kk4v-1fa7 |
| summary |
Vulnerability in X25519 constant-time cryptographic implementations due to timing side channels introduced by compiler optimizations and CPU architecture limitations, specifically with the Xtensa-based ESP32 chips. If targeting Xtensa it is recommended to use the low memory implementations of X25519, which is now turned on as the default for Xtensa. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-12888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04763 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04815 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04786 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04809 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04826 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04864 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04881 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04859 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00018 |
| scoring_system |
epss |
| scoring_elements |
0.04836 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-12888 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-12888
|
| risk_score |
0.2 |
| exploitability |
0.5 |
| weighted_severity |
0.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hk8r-kk4v-1fa7 |
|
| 16 |
| url |
VCID-jxf4-y1au-5bhw |
| vulnerability_id |
VCID-jxf4-y1au-5bhw |
| summary |
Heap-based buffer overflow in the KCAPI ECC code path of wc_ecc_import_x963_ex() in wolfSSL wolfcrypt allows a remote attacker to write attacker-controlled data past the bounds of the pubkey_raw buffer via a crafted oversized EC public key point. The WOLFSSL_KCAPI_ECC code path copies the input to key->pubkey_raw (132 bytes) using XMEMCPY without a bounds check, unlike the ATECC code path which includes a length validation. This can be triggered during TLS key exchange when a malicious peer sends a crafted ECPoint in ServerKeyExchange. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-4395 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31961 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31928 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32057 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32097 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31971 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.32003 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00126 |
| scoring_system |
epss |
| scoring_elements |
0.31962 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-4395 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-4395
|
| risk_score |
0.6 |
| exploitability |
0.5 |
| weighted_severity |
1.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jxf4-y1au-5bhw |
|
| 17 |
| url |
VCID-khur-3ax7-9fhb |
| vulnerability_id |
VCID-khur-3ax7-9fhb |
| summary |
Integer Underflow Leads to Out-of-Bounds Access in XChaCha20-Poly1305 Decrypt. This issue is hit specifically with a call to the function wc_XChaCha20Poly1305_Decrypt() which is not used with TLS connections, only from direct calls from an application. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05568 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05616 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.0556 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05598 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05594 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05633 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05658 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05631 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00021 |
| scoring_system |
epss |
| scoring_elements |
0.05622 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11931 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11931
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-khur-3ax7-9fhb |
|
| 18 |
| url |
VCID-n64w-nq6a-m7bv |
| vulnerability_id |
VCID-n64w-nq6a-m7bv |
| summary |
In wolfSSL 5.8.4, constant-time masking logic in sp_256_get_entry_256_9 is optimized into conditional branches (bnez) by GCC when targeting RISC-V RV32I with -O3. This transformation breaks the side-channel resistance of ECC scalar multiplication, potentially allowing a local attacker to recover secret keys via timing analysis. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3580 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02029 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02053 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02074 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.0208 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02075 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02077 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02094 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02072 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02057 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3580 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3580
|
| risk_score |
0.9 |
| exploitability |
0.5 |
| weighted_severity |
1.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n64w-nq6a-m7bv |
|
| 19 |
| url |
VCID-njbj-f91t-b7f4 |
| vulnerability_id |
VCID-njbj-f91t-b7f4 |
| summary |
Improper Input Validation in the TLS 1.3 CKS extension parsing in wolfSSL 5.8.2 and earlier on multiple platforms allows a remote unauthenticated attacker to potentially cause a denial-of-service via a crafted ClientHello message with duplicate CKS extensions. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11933 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.1749 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17644 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17598 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17545 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17708 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17755 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00056 |
| scoring_system |
epss |
| scoring_elements |
0.17626 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11933 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/wolfSSL/wolfssl |
| reference_id |
wolfssl |
| reference_type |
|
| scores |
| 0 |
| value |
2.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:20:56Z/ |
|
|
| url |
https://github.com/wolfSSL/wolfssl |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11933
|
| risk_score |
1.1 |
| exploitability |
0.5 |
| weighted_severity |
2.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-njbj-f91t-b7f4 |
|
| 20 |
| url |
VCID-uvht-9bt9-hfbb |
| vulnerability_id |
VCID-uvht-9bt9-hfbb |
| summary |
Missing required cryptographic step in the TLS 1.3 client HelloRetryRequest handshake logic in wolfSSL could lead to a compromise in the confidentiality of TLS-protected communications via a crafted HelloRetryRequest followed by a ServerHello message that omits the required key_share extension, resulting in derivation of predictable traffic secrets from (EC)DHE shared secret. This issue does not affect the client's authentication of the server during TLS handshakes. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1932 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19168 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19221 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19227 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1918 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19372 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20036 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00065 |
| scoring_system |
epss |
| scoring_elements |
0.20018 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3230 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3230
|
| risk_score |
0.6 |
| exploitability |
0.5 |
| weighted_severity |
1.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uvht-9bt9-hfbb |
|
| 21 |
| url |
VCID-v3m6-zajw-bfhb |
| vulnerability_id |
VCID-v3m6-zajw-bfhb |
| summary |
An integer overflow vulnerability existed in the static function wolfssl_add_to_chain, that caused heap corruption when certificate data was written out of bounds of an insufficiently sized certificate buffer. wolfssl_add_to_chain is called by these API: wolfSSL_CTX_add_extra_chain_cert, wolfSSL_CTX_add1_chain_cert, wolfSSL_add0_chain_cert. These API are enabled for 3rd party compatibility features: enable-opensslall, enable-opensslextra, enable-lighty, enable-stunnel, enable-nginx, enable-haproxy. This issue is not remotely exploitable, and would require that the application context loading certificates is compromised. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02039 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02064 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02087 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02094 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02088 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02089 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02107 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02084 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02069 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-3229 |
|
| 1 |
|
| 2 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-3229
|
| risk_score |
0.6 |
| exploitability |
0.5 |
| weighted_severity |
1.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-v3m6-zajw-bfhb |
|
| 22 |
| url |
VCID-xuyn-pjpb-g7du |
| vulnerability_id |
VCID-xuyn-pjpb-g7du |
| summary |
A heap-buffer-overflow vulnerability exists in wolfSSL's wolfSSL_d2i_SSL_SESSION() function. When deserializing session data with SESSION_CERTS enabled, certificate and session id lengths are read from an untrusted input without bounds validation, allowing an attacker to overflow fixed-size buffers and corrupt heap memory. A maliciously crafted session would need to be loaded from an external source to trigger this vulnerability. Internal sessions were not vulnerable. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-2646 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02123 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02166 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02151 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02148 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02167 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02172 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02168 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00013 |
| scoring_system |
epss |
| scoring_elements |
0.02189 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-2646 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-2646
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xuyn-pjpb-g7du |
|
| 23 |
| url |
VCID-xxkx-w5pc-5uap |
| vulnerability_id |
VCID-xxkx-w5pc-5uap |
| summary |
Improper input validation in the TLS 1.3 KeyShareEntry parsing in wolfSSL v5.8.2 on multiple platforms allows a remote unauthenticated attacker to cause a denial-of-service by sending a crafted ClientHello message containing duplicate KeyShareEntry values for the same supported group, leading to excessive CPU and memory consumption during ClientHello processing. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11936 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13272 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13447 |
| published_at |
2026-04-11T12:55:00Z |
|
| 2 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13412 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13366 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13483 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13544 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1334 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13423 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13473 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-11936 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/wolfSSL/wolfssl |
| reference_id |
wolfssl |
| reference_type |
|
| scores |
| 0 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-24T16:19:13Z/ |
|
|
| url |
https://github.com/wolfSSL/wolfssl |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-11936
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xxkx-w5pc-5uap |
|