{"uuid": "57b32230-48b5-4a9d-aa94-930c080ca7c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42905", "type": "seen", "source": "https://t.me/arpsyndicate/3026", "content": "#ExploitObserverAlert\n\nCVE-2022-42905\n\nDESCRIPTION: Exploit Observer has 6 entries in 4 file formats related to CVE-2022-42905. In wolfSSL before 5.5.2, if callback functions are enabled (via the WOLFSSL_CALLBACKS flag), then a malicious TLS 1.3 client or network attacker can trigger a buffer over-read on the heap of 5 bytes. (WOLFSSL_CALLBACKS is only intended for debugging.)\n\nFIRST-EPSS: 0.001410000\nNVD-IS: 5.2\nNVD-ES: 3.9", "creation_timestamp": "2024-01-26T18:07:14.000000Z"}