The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade wolfssl/wolfssl to version 5.9.1 or higher.
Affected versions of this package are vulnerable to Integer Underflow (Wrap or Wraparound) in the parsing of the Subject Alternative Name extension of X.509 certificates due to improper handling of entry lengths in the process. An attacker can cause incorrect processing of certificate data by supplying a malformed certificate with an entry length larger than the enclosing sequence, resulting in an internal length counter wrap. This is only exploitable if the original ASN.1 parsing implementation is enabled.