Find out if you have vulnerabilities that put you at risk

Test your applications
Toggle filtering controls
Report a new vulnerability
VULNERABILITYAFFECTSTYPEPUBLISHED
  • H
Fault Injection
wolfssl[,5.7.2)Conan8 May 2025
  • M
Fault Injection
wolfssl[,5.7.0)Conan8 May 2025
  • H
Improper Validation of Array Index
wolfssl[,5.7.0)Conan8 May 2025
  • L
Buffer Over-read
wolfssl[,5.6.6)Conan8 May 2025
  • M
Marvin Attack
wolfssl[,5.6.6)Conan8 May 2025
  • M
Observable Discrepancy
wolfssl[,5.6.6)Conan8 May 2025
  • C
Insecure Randomness
wolfssl[,5.6.3)Conan8 May 2025
  • M
Heap-based Buffer Overflow
wolfssl[,5.6.3)Conan8 May 2025
  • L
Information Exposure
wolfssl[,5.5.1)Conan8 May 2025
  • M
Buffer Overflow
wolfssl[,5.5.1)Conan8 May 2025
  • L
Denial of Service (DoS)
wolfssl[,5.1.1)Conan8 May 2025
  • H
Denial of Service (DoS)
wolfssl[,5.4.0)Conan8 May 2025
  • M
Access Restriction Bypass
wolfssl[,5.2.0)Conan8 May 2025
  • H
Access Restriction Bypass
wolfssl[,5.2.0)Conan8 May 2025
  • C
Out-of-Bounds
wolfssl[0,]Conan8 May 2025
  • C
Out-of-bounds Read
wolfssl[0,]Conan8 May 2025
  • M
CVE-2020-24585
wolfssl[,4.5.0)Conan8 May 2025
  • H
Improper Certificate Validation
wolfssl[,4.7.1)Conan8 May 2025
  • M
Insufficient Verification of Data Authenticity
wolfssl[,4.8.1)Conan8 May 2025
  • C
Out-of-bounds Write
wolfssl[,4.6.0)Conan8 May 2025
  • H
User Enumeration
wolfssl[0,]Conan8 May 2025
  • H
Race Condition
wolfssl[,4.5.0)Conan8 May 2025
  • M
Improper Certificate Validation
wolfssl[,4.5.0)Conan8 May 2025
  • M
User Enumeration
wolfssl[,4.6.0)Conan8 May 2025
  • C
Denial of Service (DoS)
wolfssl[4.6.0,4.8.1)Conan8 May 2025
  • H
Improper Input Validation
wolfssl[,4.5.0)Conan8 May 2025
  • H
Use After Free
wayland[,1.21.0)Conan8 May 2025
  • H
Out-of-bounds Read
vorbis[0,]Conan8 May 2025
  • H
Out-of-Bounds
vorbis[0,]Conan8 May 2025
  • M
Improper Input Validation
vorbis[0,]Conan8 May 2025