The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade wolfssl/wolfssl
to version 5.5.1 or higher.
Affected versions of this package are vulnerable to Buffer Overflow in the TLSX_ConnectionID_Parse()
function in dtls.c
and the DoTls13ClientHello()
function in tls13.c
. A server is vulnerable only when --enable-session-ticket
is set and TLS 1.3 is in use. Under those conditions, a malicious ClientHello packet triggering a Hello Retry Request can cause a buffer overflow during a TLS 1.3 handshake, crashing the server.