{"url":"http://public2.vulnerablecode.io/api/packages/942910?format=json","purl":"pkg:deb/debian/wolfssl@5.6.6-1.2?distro=trixie","type":"deb","namespace":"debian","name":"wolfssl","version":"5.6.6-1.2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.7.0-0.3","latest_non_vulnerable_version":"5.9.1-0.1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95892?format=json","vulnerability_id":"VCID-24s5-d6jt-4kfe","summary":"In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6936","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50813","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50693","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50725","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50812","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50786","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50743","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50799","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50814","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50822","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50778","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50653","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50707","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50739","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6936"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6936","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6936"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357","reference_id":"1059357","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357"},{"reference_url":"https://github.com/wolfSSL/wolfssl/pull/6949/","reference_id":"6949","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-27T14:22:41Z/"}],"url":"https://github.com/wolfSSL/wolfssl/pull/6949/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942910?format=json","purl":"pkg:deb/debian/wolfssl@5.6.6-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.6.6-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942887?format=json","purl":"pkg:deb/debian/wolfssl@5.7.2-0.1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-2ry7-trrg-gfdk"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zda-zrq6-hbc8"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-6v8z-cfax-zqbh"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-8735-ectc-j7a3"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-9jpj-dfsf-qkce"},{"vulnerability":"VCID-9jw2-3v9v-ruap"},{"vulnerability":"VCID-9kev-ferz-5bhr"},{"vulnerability":"VCID-9x14-2t7m-1kbm"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-cxhw-3w24-dkes"},{"vulnerability":"VCID-f57c-kamk-3bct"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-fmtp-x6y7-83g1"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gcfd-w8je-kqfm"},{"vulnerability":"VCID-gdur-h588-vbb6"},{"vulnerability":"VCID-gmdj-a1ys-tqc2"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-h6na-nxxq-5yg9"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-hk8r-kk4v-1fa7"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-jxf4-y1au-5bhw"},{"vulnerability":"VCID-khur-3ax7-9fhb"},{"vulnerability":"VCID-n64w-nq6a-m7bv"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-njbj-f91t-b7f4"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-uvht-9bt9-hfbb"},{"vulnerability":"VCID-v3m6-zajw-bfhb"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"},{"vulnerability":"VCID-xuyn-pjpb-g7du"},{"vulnerability":"VCID-xxkx-w5pc-5uap"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.7.2-0.1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942886?format=json","purl":"pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076143?format=json","purl":"pkg:deb/debian/wolfssl@5.9.1-0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.1-0.1%3Fdistro=trixie"}],"aliases":["CVE-2023-6936"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-24s5-d6jt-4kfe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95930?format=json","vulnerability_id":"VCID-7xbp-qkvv-bqgm","summary":"The side-channel protected T-Table implementation in wolfSSL up to version 5.6.5 protects against a side-channel attacker with cache-line resolution. In a controlled environment such as Intel SGX, an attacker can gain a per instruction sub-cache-line resolution allowing them to break the cache-line-level protection. For details on the attack refer to:  https://doi.org/10.46586/tches.v2024.i1.457-500","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1543","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12459","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12416","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1242","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12455","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12499","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12383","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12434","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12401","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12262","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12365","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12128","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12264","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12327","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1232","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12343","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1543"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1543"},{"reference_url":"https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-566-dec-19-2023","reference_id":"ChangeLog.md#wolfssl-release-566-dec-19-2023","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-30T14:19:28Z/"}],"url":"https://github.com/wolfSSL/wolfssl/blob/master/ChangeLog.md#wolfssl-release-566-dec-19-2023"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942910?format=json","purl":"pkg:deb/debian/wolfssl@5.6.6-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.6.6-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942887?format=json","purl":"pkg:deb/debian/wolfssl@5.7.2-0.1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-2ry7-trrg-gfdk"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zda-zrq6-hbc8"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-6v8z-cfax-zqbh"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-8735-ectc-j7a3"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-9jpj-dfsf-qkce"},{"vulnerability":"VCID-9jw2-3v9v-ruap"},{"vulnerability":"VCID-9kev-ferz-5bhr"},{"vulnerability":"VCID-9x14-2t7m-1kbm"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-cxhw-3w24-dkes"},{"vulnerability":"VCID-f57c-kamk-3bct"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-fmtp-x6y7-83g1"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gcfd-w8je-kqfm"},{"vulnerability":"VCID-gdur-h588-vbb6"},{"vulnerability":"VCID-gmdj-a1ys-tqc2"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-h6na-nxxq-5yg9"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-hk8r-kk4v-1fa7"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-jxf4-y1au-5bhw"},{"vulnerability":"VCID-khur-3ax7-9fhb"},{"vulnerability":"VCID-n64w-nq6a-m7bv"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-njbj-f91t-b7f4"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-uvht-9bt9-hfbb"},{"vulnerability":"VCID-v3m6-zajw-bfhb"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"},{"vulnerability":"VCID-xuyn-pjpb-g7du"},{"vulnerability":"VCID-xxkx-w5pc-5uap"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.7.2-0.1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942886?format=json","purl":"pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076143?format=json","purl":"pkg:deb/debian/wolfssl@5.9.1-0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.1-0.1%3Fdistro=trixie"}],"aliases":["CVE-2024-1543"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xbp-qkvv-bqgm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95893?format=json","vulnerability_id":"VCID-u24a-2khf-uyba","summary":"wolfSSL prior to 5.6.6 did not check that messages in one (D)TLS record do not span key boundaries. As a result, it was possible to combine (D)TLS messages using different keys into one (D)TLS record. The most extreme edge case is that, in (D)TLS 1.3, it was possible that an unencrypted (D)TLS 1.3 record from the server containing first a ServerHello message and then the rest of the first server flight would be accepted by a wolfSSL client. In (D)TLS 1.3 the handshake is encrypted after the ServerHello but a wolfSSL client would accept an unencrypted flight from the server. This does not compromise key negotiation and authentication so it is assigned a low severity rating.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6937","reference_id":"","reference_type":"","scores":[{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63433","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63354","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63409","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63419","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63248","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63284","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63285","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63272","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63291","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63305","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.6327","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63367","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00442","scoring_system":"epss","scoring_elements":"0.63327","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6937"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6937","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6937"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357","reference_id":"1059357","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357"},{"reference_url":"https://github.com/wolfSSL/wolfssl/pull/7029","reference_id":"7029","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-24T15:13:21Z/"}],"url":"https://github.com/wolfSSL/wolfssl/pull/7029"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942910?format=json","purl":"pkg:deb/debian/wolfssl@5.6.6-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.6.6-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942887?format=json","purl":"pkg:deb/debian/wolfssl@5.7.2-0.1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-2ry7-trrg-gfdk"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zda-zrq6-hbc8"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-6v8z-cfax-zqbh"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-8735-ectc-j7a3"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-9jpj-dfsf-qkce"},{"vulnerability":"VCID-9jw2-3v9v-ruap"},{"vulnerability":"VCID-9kev-ferz-5bhr"},{"vulnerability":"VCID-9x14-2t7m-1kbm"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-cxhw-3w24-dkes"},{"vulnerability":"VCID-f57c-kamk-3bct"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-fmtp-x6y7-83g1"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gcfd-w8je-kqfm"},{"vulnerability":"VCID-gdur-h588-vbb6"},{"vulnerability":"VCID-gmdj-a1ys-tqc2"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-h6na-nxxq-5yg9"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-hk8r-kk4v-1fa7"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-jxf4-y1au-5bhw"},{"vulnerability":"VCID-khur-3ax7-9fhb"},{"vulnerability":"VCID-n64w-nq6a-m7bv"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-njbj-f91t-b7f4"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-uvht-9bt9-hfbb"},{"vulnerability":"VCID-v3m6-zajw-bfhb"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"},{"vulnerability":"VCID-xuyn-pjpb-g7du"},{"vulnerability":"VCID-xxkx-w5pc-5uap"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.7.2-0.1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942886?format=json","purl":"pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076143?format=json","purl":"pkg:deb/debian/wolfssl@5.9.1-0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.1-0.1%3Fdistro=trixie"}],"aliases":["CVE-2023-6937"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u24a-2khf-uyba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95891?format=json","vulnerability_id":"VCID-zhf4-y8v8-gubn","summary":"wolfSSL SP Math All RSA implementation is vulnerable to the Marvin Attack, new variation of a timing Bleichenbacher style attack, when built with the following options to configure:  --enable-all CFLAGS=\"-DWOLFSSL_STATIC_RSA\"  The define “WOLFSSL_STATIC_RSA” enables static RSA cipher suites, which is not recommended, and has been disabled by default since wolfSSL 3.6.6.  Therefore the default build since 3.6.6, even with \"--enable-all\", is not vulnerable to the Marvin Attack. The vulnerability is specific to static RSA cipher suites, and expected to be padding-independent.  The vulnerability allows an attacker to decrypt ciphertexts and forge signatures after probing with a large number of test observations. However the server’s private key is not exposed.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6935","reference_id":"","reference_type":"","scores":[{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54698","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54592","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54589","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54616","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54681","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54694","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54584","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54635","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.5463","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54643","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54626","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.5461","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54577","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00315","scoring_system":"epss","scoring_elements":"0.54629","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6935"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6935","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6935"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357","reference_id":"1059357","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059357"},{"reference_url":"https://people.redhat.com/~hkario/marvin/","reference_id":"marvin","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-12T12:48:11Z/"}],"url":"https://people.redhat.com/~hkario/marvin/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942910?format=json","purl":"pkg:deb/debian/wolfssl@5.6.6-1.2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.6.6-1.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942887?format=json","purl":"pkg:deb/debian/wolfssl@5.7.2-0.1%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-2ry7-trrg-gfdk"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zda-zrq6-hbc8"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-6v8z-cfax-zqbh"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-8735-ectc-j7a3"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-9jpj-dfsf-qkce"},{"vulnerability":"VCID-9jw2-3v9v-ruap"},{"vulnerability":"VCID-9kev-ferz-5bhr"},{"vulnerability":"VCID-9x14-2t7m-1kbm"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-cxhw-3w24-dkes"},{"vulnerability":"VCID-f57c-kamk-3bct"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-fmtp-x6y7-83g1"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gcfd-w8je-kqfm"},{"vulnerability":"VCID-gdur-h588-vbb6"},{"vulnerability":"VCID-gmdj-a1ys-tqc2"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-h6na-nxxq-5yg9"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-hk8r-kk4v-1fa7"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-jxf4-y1au-5bhw"},{"vulnerability":"VCID-khur-3ax7-9fhb"},{"vulnerability":"VCID-n64w-nq6a-m7bv"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-njbj-f91t-b7f4"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-uvht-9bt9-hfbb"},{"vulnerability":"VCID-v3m6-zajw-bfhb"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"},{"vulnerability":"VCID-xuyn-pjpb-g7du"},{"vulnerability":"VCID-xxkx-w5pc-5uap"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.7.2-0.1%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942886?format=json","purl":"pkg:deb/debian/wolfssl@5.9.0-0.2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-15fz-hhc7-kyaa"},{"vulnerability":"VCID-24mg-wn6a-6bew"},{"vulnerability":"VCID-3gve-u4f4-bkht"},{"vulnerability":"VCID-4zyq-af27-yqa4"},{"vulnerability":"VCID-75y2-h9uk-n3a6"},{"vulnerability":"VCID-9jb1-k32z-w7gw"},{"vulnerability":"VCID-bfap-h1d9-33dj"},{"vulnerability":"VCID-cv4y-g4un-ckd4"},{"vulnerability":"VCID-f5kd-yqz2-nkcb"},{"vulnerability":"VCID-g5u9-khw6-4kgn"},{"vulnerability":"VCID-gtdh-mytb-t3fh"},{"vulnerability":"VCID-hdbf-118z-2yec"},{"vulnerability":"VCID-jc3b-m4ud-n7fw"},{"vulnerability":"VCID-jvnf-vh29-ufdh"},{"vulnerability":"VCID-n6uz-fe7m-uqhk"},{"vulnerability":"VCID-nqhj-d7uw-43hd"},{"vulnerability":"VCID-srmp-3tvp-9uhv"},{"vulnerability":"VCID-u55w-unmd-97cm"},{"vulnerability":"VCID-udcq-enxt-wyf1"},{"vulnerability":"VCID-ugd8-9xzt-xbdz"},{"vulnerability":"VCID-vugd-2jfz-23b5"},{"vulnerability":"VCID-x3uy-7crx-2kae"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.0-0.2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076143?format=json","purl":"pkg:deb/debian/wolfssl@5.9.1-0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.9.1-0.1%3Fdistro=trixie"}],"aliases":["CVE-2023-6935"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhf4-y8v8-gubn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wolfssl@5.6.6-1.2%3Fdistro=trixie"}