Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-6936

Опубликовано: 07 дек. 2024
Источник: msrc
CVSS3: 9.1
EPSS Низкий

Описание

Описание отсутствует

EPSS

Процентиль: 57%
0.00358
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

CVSS3: 5.3
nvd
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

CVSS3: 5.3
debian
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the ...

CVSS3: 5.3
github
почти 2 года назад

In wolfSSL prior to 5.6.6, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS client or network attacker can trigger a buffer over-read on the heap of 5 bytes (WOLFSSL_CALLBACKS is only intended for debugging).

EPSS

Процентиль: 57%
0.00358
Низкий

9.1 Critical

CVSS3