Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-45963 | In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.) |
Fri, 02 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-02T18:39:54.570Z
Reserved: 2022-10-13T00:00:00.000Z
Link: CVE-2022-42905
Updated: 2024-08-03T13:19:05.343Z
Status : Modified
Published: 2022-11-07T00:15:09.643
Modified: 2025-05-02T19:15:54.400
Link: CVE-2022-42905
No data.
OpenCVE Enrichment
No data.
EUVD