Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/mbedtls@0?distro=trixie
Typedeb
Namespacedebian
Namembedtls
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.2-1
Latest_non_vulnerable_version3.6.4-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-33uw-hd5z-g7dq
vulnerability_id VCID-33uw-hd5z-g7dq
summary An issue was discovered in Mbed TLS 3.6 before 3.6.1. A stack buffer overflow in mbedtls_ecdsa_der_to_raw() and mbedtls_ecdsa_raw_to_der() can occur when the bits parameter is larger than the largest supported curve. In some configurations with PSA disabled, all values of bits are affected. (This never happens in internal library calls, but can affect applications that call these functions directly.)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45158
reference_id
reference_type
scores
0
value 0.00681
scoring_system epss
scoring_elements 0.7163
published_at 2026-04-21T12:55:00Z
1
value 0.00681
scoring_system epss
scoring_elements 0.71598
published_at 2026-04-13T12:55:00Z
2
value 0.00681
scoring_system epss
scoring_elements 0.71609
published_at 2026-04-09T12:55:00Z
3
value 0.00681
scoring_system epss
scoring_elements 0.71632
published_at 2026-04-11T12:55:00Z
4
value 0.00681
scoring_system epss
scoring_elements 0.71616
published_at 2026-04-12T12:55:00Z
5
value 0.00681
scoring_system epss
scoring_elements 0.71643
published_at 2026-04-16T12:55:00Z
6
value 0.00681
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-18T12:55:00Z
7
value 0.00681
scoring_system epss
scoring_elements 0.71568
published_at 2026-04-02T12:55:00Z
8
value 0.00681
scoring_system epss
scoring_elements 0.71585
published_at 2026-04-04T12:55:00Z
9
value 0.00681
scoring_system epss
scoring_elements 0.71558
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45158
1
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-2/
reference_id mbedtls-security-advisory-2024-08-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-2/
2
reference_url https://github.com/Mbed-TLS/mbedtls/releases/
reference_id releases
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/
url https://github.com/Mbed-TLS/mbedtls/releases/
3
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-45158
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-33uw-hd5z-g7dq
1
url VCID-4sbv-dqyv-6baw
vulnerability_id VCID-4sbv-dqyv-6baw
summary An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45157
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37213
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-09T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37299
published_at 2026-04-11T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37266
published_at 2026-04-12T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37238
published_at 2026-04-13T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37284
published_at 2026-04-16T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37267
published_at 2026-04-18T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.3737
published_at 2026-04-02T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37396
published_at 2026-04-04T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37224
published_at 2026-04-07T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37275
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45157
1
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
reference_id mbedtls-security-advisory-2024-08-1
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/
2
reference_url https://github.com/Mbed-TLS/mbedtls/releases/
reference_id releases
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/
url https://github.com/Mbed-TLS/mbedtls/releases/
3
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
aliases CVE-2024-45157
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4sbv-dqyv-6baw
2
url VCID-64rr-rrmq-nkh6
vulnerability_id VCID-64rr-rrmq-nkh6
summary In Mbed TLS 3.3.0 through 3.5.2 before 3.6.0, a malicious client can cause information disclosure or a denial of service because of a stack buffer over-read (of less than 256 bytes) in a TLS 1.3 server via a TLS 3.1 ClientHello.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-30166
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57385
published_at 2026-04-18T12:55:00Z
1
value 0.00348
scoring_system epss
scoring_elements 0.57404
published_at 2026-04-11T12:55:00Z
2
value 0.00348
scoring_system epss
scoring_elements 0.57384
published_at 2026-04-12T12:55:00Z
3
value 0.00348
scoring_system epss
scoring_elements 0.57363
published_at 2026-04-21T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.5739
published_at 2026-04-16T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57336
published_at 2026-04-02T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57358
published_at 2026-04-04T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57335
published_at 2026-04-07T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57386
published_at 2026-04-08T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57389
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-30166
1
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-01T14:09:37Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
2
reference_url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0
reference_id v3.6.0
reference_type
scores
0
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-01T14:09:37Z/
url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-30166
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-64rr-rrmq-nkh6
3
url VCID-84ba-26t7-eyf8
vulnerability_id VCID-84ba-26t7-eyf8
summary An issue was discovered in Mbed TLS 3.5.1. There is persistent handshake denial if a client sends a TLS 1.3 ClientHello without extensions.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23744
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15151
published_at 2026-04-21T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15093
published_at 2026-04-16T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15101
published_at 2026-04-18T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15301
published_at 2026-04-02T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15371
published_at 2026-04-04T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15174
published_at 2026-04-07T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15263
published_at 2026-04-08T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15313
published_at 2026-04-09T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15283
published_at 2026-04-11T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15245
published_at 2026-04-12T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.15179
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23744
1
reference_url https://github.com/Mbed-TLS/mbedtls/issues/8694
reference_id 8694
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T17:45:29Z/
url https://github.com/Mbed-TLS/mbedtls/issues/8694
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-23744
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84ba-26t7-eyf8
4
url VCID-9615-yuce-qye3
vulnerability_id VCID-9615-yuce-qye3
summary Mbed TLS 3.5.x through 3.6.x before 3.6.2 has a buffer underrun in pkwrite when writing an opaque key pair
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-49195
reference_id
reference_type
scores
0
value 0.00996
scoring_system epss
scoring_elements 0.76978
published_at 2026-04-21T12:55:00Z
1
value 0.00996
scoring_system epss
scoring_elements 0.76967
published_at 2026-04-11T12:55:00Z
2
value 0.00996
scoring_system epss
scoring_elements 0.76946
published_at 2026-04-12T12:55:00Z
3
value 0.00996
scoring_system epss
scoring_elements 0.76942
published_at 2026-04-13T12:55:00Z
4
value 0.00996
scoring_system epss
scoring_elements 0.76983
published_at 2026-04-16T12:55:00Z
5
value 0.00996
scoring_system epss
scoring_elements 0.76985
published_at 2026-04-18T12:55:00Z
6
value 0.00996
scoring_system epss
scoring_elements 0.76885
published_at 2026-04-02T12:55:00Z
7
value 0.00996
scoring_system epss
scoring_elements 0.76915
published_at 2026-04-04T12:55:00Z
8
value 0.00996
scoring_system epss
scoring_elements 0.76897
published_at 2026-04-07T12:55:00Z
9
value 0.00996
scoring_system epss
scoring_elements 0.76929
published_at 2026-04-08T12:55:00Z
10
value 0.00996
scoring_system epss
scoring_elements 0.76939
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-49195
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-10-1/
reference_id mbedtls-security-advisory-2024-10-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-17T17:16:25Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-10-1/
3
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-17T17:16:25Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.2-1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.2-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-49195
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9615-yuce-qye3
5
url VCID-cbdd-4dr5-53f6
vulnerability_id VCID-cbdd-4dr5-53f6
summary security update
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8036
reference_id
reference_type
scores
0
value 0.01445
scoring_system epss
scoring_elements 0.80781
published_at 2026-04-21T12:55:00Z
1
value 0.01445
scoring_system epss
scoring_elements 0.80685
published_at 2026-04-01T12:55:00Z
2
value 0.01445
scoring_system epss
scoring_elements 0.80694
published_at 2026-04-02T12:55:00Z
3
value 0.01445
scoring_system epss
scoring_elements 0.80715
published_at 2026-04-04T12:55:00Z
4
value 0.01445
scoring_system epss
scoring_elements 0.80711
published_at 2026-04-07T12:55:00Z
5
value 0.01445
scoring_system epss
scoring_elements 0.8074
published_at 2026-04-08T12:55:00Z
6
value 0.01445
scoring_system epss
scoring_elements 0.80748
published_at 2026-04-09T12:55:00Z
7
value 0.01445
scoring_system epss
scoring_elements 0.80765
published_at 2026-04-11T12:55:00Z
8
value 0.01445
scoring_system epss
scoring_elements 0.80749
published_at 2026-04-12T12:55:00Z
9
value 0.01445
scoring_system epss
scoring_elements 0.80741
published_at 2026-04-13T12:55:00Z
10
value 0.01445
scoring_system epss
scoring_elements 0.80778
published_at 2026-04-16T12:55:00Z
11
value 0.01445
scoring_system epss
scoring_elements 0.8078
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8036
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036
5
reference_url https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf
reference_id
reference_type
scores
url https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf
6
reference_url https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/
reference_id
reference_type
scores
url https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/
7
reference_url https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01
reference_id
reference_type
scores
url https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01
8
reference_url http://www.debian.org/security/2016/dsa-3468
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3468
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8036
reference_id CVE-2015-8036
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8036
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2015-8036
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cbdd-4dr5-53f6
6
url VCID-ct4s-c1rd-suhj
vulnerability_id VCID-ct4s-c1rd-suhj
summary Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45450
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.2175
published_at 2026-04-01T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21914
published_at 2026-04-02T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21967
published_at 2026-04-04T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21733
published_at 2026-04-07T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.2181
published_at 2026-04-08T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.21866
published_at 2026-04-09T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21877
published_at 2026-04-11T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21837
published_at 2026-04-12T12:55:00Z
8
value 0.00071
scoring_system epss
scoring_elements 0.21779
published_at 2026-04-13T12:55:00Z
9
value 0.00071
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-16T12:55:00Z
10
value 0.00071
scoring_system epss
scoring_elements 0.21787
published_at 2026-04-18T12:55:00Z
11
value 0.00071
scoring_system epss
scoring_elements 0.21752
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45450
1
reference_url https://security.gentoo.org/glsa/202301-08
reference_id GLSA-202301-08
reference_type
scores
url https://security.gentoo.org/glsa/202301-08
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2021-45450
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ct4s-c1rd-suhj
7
url VCID-d8d5-v1dc-kyfp
vulnerability_id VCID-d8d5-v1dc-kyfp
summary An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52353
reference_id
reference_type
scores
0
value 0.00052
scoring_system epss
scoring_elements 0.16473
published_at 2026-04-02T12:55:00Z
1
value 0.00052
scoring_system epss
scoring_elements 0.1636
published_at 2026-04-13T12:55:00Z
2
value 0.00052
scoring_system epss
scoring_elements 0.16296
published_at 2026-04-16T12:55:00Z
3
value 0.00052
scoring_system epss
scoring_elements 0.16316
published_at 2026-04-18T12:55:00Z
4
value 0.00052
scoring_system epss
scoring_elements 0.16536
published_at 2026-04-04T12:55:00Z
5
value 0.00052
scoring_system epss
scoring_elements 0.16332
published_at 2026-04-07T12:55:00Z
6
value 0.00052
scoring_system epss
scoring_elements 0.16418
published_at 2026-04-08T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16477
published_at 2026-04-09T12:55:00Z
8
value 0.00052
scoring_system epss
scoring_elements 0.16461
published_at 2026-04-11T12:55:00Z
9
value 0.00052
scoring_system epss
scoring_elements 0.16421
published_at 2026-04-12T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16809
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52353
1
reference_url https://github.com/Mbed-TLS/mbedtls/issues/8654
reference_id 8654
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:18:23Z/
url https://github.com/Mbed-TLS/mbedtls/issues/8654
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2023-52353
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d8d5-v1dc-kyfp
8
url VCID-dvwa-tj33-h3em
vulnerability_id VCID-dvwa-tj33-h3em
summary Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45199
reference_id
reference_type
scores
0
value 0.09273
scoring_system epss
scoring_elements 0.9275
published_at 2026-04-21T12:55:00Z
1
value 0.09273
scoring_system epss
scoring_elements 0.9271
published_at 2026-04-02T12:55:00Z
2
value 0.09273
scoring_system epss
scoring_elements 0.92716
published_at 2026-04-04T12:55:00Z
3
value 0.09273
scoring_system epss
scoring_elements 0.92714
published_at 2026-04-07T12:55:00Z
4
value 0.09273
scoring_system epss
scoring_elements 0.92725
published_at 2026-04-08T12:55:00Z
5
value 0.09273
scoring_system epss
scoring_elements 0.92729
published_at 2026-04-09T12:55:00Z
6
value 0.09273
scoring_system epss
scoring_elements 0.92735
published_at 2026-04-11T12:55:00Z
7
value 0.09273
scoring_system epss
scoring_elements 0.92734
published_at 2026-04-12T12:55:00Z
8
value 0.09273
scoring_system epss
scoring_elements 0.92733
published_at 2026-04-13T12:55:00Z
9
value 0.09273
scoring_system epss
scoring_elements 0.92745
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45199
1
reference_url https://security.gentoo.org/glsa/202409-14
reference_id GLSA-202409-14
reference_type
scores
url https://security.gentoo.org/glsa/202409-14
2
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/
reference_id mbedtls-security-advisory-2023-10-2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-19T15:42:54Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2023-45199
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvwa-tj33-h3em
9
url VCID-gzvn-8b6y-xqeb
vulnerability_id VCID-gzvn-8b6y-xqeb
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html
4
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-5291
reference_id
reference_type
scores
0
value 0.02049
scoring_system epss
scoring_elements 0.83892
published_at 2026-04-21T12:55:00Z
1
value 0.02049
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-01T12:55:00Z
2
value 0.02049
scoring_system epss
scoring_elements 0.83806
published_at 2026-04-02T12:55:00Z
3
value 0.02049
scoring_system epss
scoring_elements 0.8382
published_at 2026-04-04T12:55:00Z
4
value 0.02049
scoring_system epss
scoring_elements 0.83822
published_at 2026-04-07T12:55:00Z
5
value 0.02049
scoring_system epss
scoring_elements 0.83846
published_at 2026-04-08T12:55:00Z
6
value 0.02049
scoring_system epss
scoring_elements 0.83852
published_at 2026-04-09T12:55:00Z
7
value 0.02049
scoring_system epss
scoring_elements 0.83869
published_at 2026-04-11T12:55:00Z
8
value 0.02049
scoring_system epss
scoring_elements 0.83863
published_at 2026-04-12T12:55:00Z
9
value 0.02049
scoring_system epss
scoring_elements 0.83858
published_at 2026-04-13T12:55:00Z
10
value 0.02049
scoring_system epss
scoring_elements 0.83891
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-5291
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036
8
reference_url https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf
reference_id
reference_type
scores
url https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf
9
reference_url https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/
reference_id
reference_type
scores
url https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/
10
reference_url https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01
reference_id
reference_type
scores
url https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01
11
reference_url http://www.debian.org/security/2016/dsa-3468
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3468
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-5291
reference_id CVE-2015-5291
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-5291
22
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2015-5291
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gzvn-8b6y-xqeb
10
url VCID-hxpy-59gj-dygh
vulnerability_id VCID-hxpy-59gj-dygh
summary An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When negotiating the TLS version on the server side, it can fall back to the TLS 1.2 implementation of the protocol if it is disabled. If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 client could put a TLS 1.3-only server into an infinite loop processing a TLS 1.2 ClientHello, resulting in a denial of service. If the TLS 1.2 implementation was disabled at runtime, a TLS 1.2 client can successfully establish a TLS 1.2 connection with the server.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28836
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29721
published_at 2026-04-21T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29819
published_at 2026-04-12T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29768
published_at 2026-04-13T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29787
published_at 2026-04-16T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29767
published_at 2026-04-18T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29899
published_at 2026-04-02T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29947
published_at 2026-04-04T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29759
published_at 2026-04-07T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.2982
published_at 2026-04-08T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29856
published_at 2026-04-09T12:55:00Z
10
value 0.00113
scoring_system epss
scoring_elements 0.29865
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28836
1
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T15:03:49Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
2
reference_url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0
reference_id v3.6.0
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T15:03:49Z/
url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-28836
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hxpy-59gj-dygh
11
url VCID-mxn3-8deq-t3a1
vulnerability_id VCID-mxn3-8deq-t3a1
summary An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other than TLS client authentication would nonetheless be able to use it for TLS client authentication. Only TLS 1.3 servers were affected, and only with optional authentication (with required authentication, the handshake would be aborted with a fatal alert).
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45159
reference_id
reference_type
scores
0
value 0.00575
scoring_system epss
scoring_elements 0.68786
published_at 2026-04-21T12:55:00Z
1
value 0.00575
scoring_system epss
scoring_elements 0.68776
published_at 2026-04-09T12:55:00Z
2
value 0.00575
scoring_system epss
scoring_elements 0.68799
published_at 2026-04-11T12:55:00Z
3
value 0.00575
scoring_system epss
scoring_elements 0.68785
published_at 2026-04-12T12:55:00Z
4
value 0.00575
scoring_system epss
scoring_elements 0.68756
published_at 2026-04-13T12:55:00Z
5
value 0.00575
scoring_system epss
scoring_elements 0.68797
published_at 2026-04-16T12:55:00Z
6
value 0.00575
scoring_system epss
scoring_elements 0.68808
published_at 2026-04-18T12:55:00Z
7
value 0.00575
scoring_system epss
scoring_elements 0.68708
published_at 2026-04-02T12:55:00Z
8
value 0.00575
scoring_system epss
scoring_elements 0.68727
published_at 2026-04-04T12:55:00Z
9
value 0.00575
scoring_system epss
scoring_elements 0.68705
published_at 2026-04-07T12:55:00Z
10
value 0.00575
scoring_system epss
scoring_elements 0.68757
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45159
1
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/
reference_id mbedtls-security-advisory-2024-08-3
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/
2
reference_url https://github.com/Mbed-TLS/mbedtls/releases/
reference_id releases
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/
url https://github.com/Mbed-TLS/mbedtls/releases/
3
reference_url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/
url https://mbed-tls.readthedocs.io/en/latest/security-advisories/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2024-45159
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxn3-8deq-t3a1
12
url VCID-nbdz-1xnh-5kf7
vulnerability_id VCID-nbdz-1xnh-5kf7
summary In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45451
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34486
published_at 2026-04-01T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-02T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34607
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34651
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34684
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-12T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-13T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34659
published_at 2026-04-16T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34646
published_at 2026-04-18T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34605
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45451
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2021-45451
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-1xnh-5kf7
13
url VCID-rv8h-z3cy-yucb
vulnerability_id VCID-rv8h-z3cy-yucb
summary Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46393
reference_id
reference_type
scores
0
value 0.00815
scoring_system epss
scoring_elements 0.74292
published_at 2026-04-13T12:55:00Z
1
value 0.00815
scoring_system epss
scoring_elements 0.74251
published_at 2026-04-07T12:55:00Z
2
value 0.00815
scoring_system epss
scoring_elements 0.74329
published_at 2026-04-16T12:55:00Z
3
value 0.00815
scoring_system epss
scoring_elements 0.74278
published_at 2026-04-04T12:55:00Z
4
value 0.00815
scoring_system epss
scoring_elements 0.74284
published_at 2026-04-08T12:55:00Z
5
value 0.00815
scoring_system epss
scoring_elements 0.74299
published_at 2026-04-09T12:55:00Z
6
value 0.00815
scoring_system epss
scoring_elements 0.7432
published_at 2026-04-11T12:55:00Z
7
value 0.00815
scoring_system epss
scoring_elements 0.743
published_at 2026-04-12T12:55:00Z
8
value 0.00868
scoring_system epss
scoring_elements 0.75197
published_at 2026-04-21T12:55:00Z
9
value 0.00868
scoring_system epss
scoring_elements 0.75207
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46393
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/
reference_id 4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/
reference_id 6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/
4
reference_url https://security.gentoo.org/glsa/202409-14
reference_id GLSA-202409-14
reference_type
scores
url https://security.gentoo.org/glsa/202409-14
5
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
6
reference_url https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2
reference_id v2.28.2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/
url https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2
7
reference_url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0
reference_id v3.3.0
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/
url https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.2-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.2-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2022-46393
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8h-z3cy-yucb
14
url VCID-wpu6-c26t-4ufn
vulnerability_id VCID-wpu6-c26t-4ufn
summary Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could result in arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-36477
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.32792
published_at 2026-04-01T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.32922
published_at 2026-04-02T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32958
published_at 2026-04-04T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32779
published_at 2026-04-21T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32827
published_at 2026-04-08T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32856
published_at 2026-04-09T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.32857
published_at 2026-04-11T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32819
published_at 2026-04-12T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32794
published_at 2026-04-13T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32837
published_at 2026-04-16T12:55:00Z
10
value 0.00133
scoring_system epss
scoring_elements 0.32814
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-36477
1
reference_url https://security.gentoo.org/glsa/202301-08
reference_id GLSA-202301-08
reference_type
scores
url https://security.gentoo.org/glsa/202301-08
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.0-0.3?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.0-0.3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.0-0.3%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2020-36477
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpu6-c26t-4ufn
15
url VCID-xa5h-khas-8ybs
vulnerability_id VCID-xa5h-khas-8ybs
summary In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49600
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02439
published_at 2026-04-21T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02335
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02348
published_at 2026-04-02T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02359
published_at 2026-04-04T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02356
published_at 2026-04-07T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0236
published_at 2026-04-08T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02381
published_at 2026-04-09T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02358
published_at 2026-04-11T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02346
published_at 2026-04-12T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02345
published_at 2026-04-13T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02329
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49600
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787
reference_id 1108787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md
reference_id mbedtls-security-advisory-2025-06-3.md
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:18:22Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2025-49600
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xa5h-khas-8ybs
16
url VCID-yjdu-ervm-3bcn
vulnerability_id VCID-yjdu-ervm-3bcn
summary In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49087
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-04T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19126
published_at 2026-04-02T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.2814
published_at 2026-04-08T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.28074
published_at 2026-04-07T12:55:00Z
4
value 0.00102
scoring_system epss
scoring_elements 0.28183
published_at 2026-04-09T12:55:00Z
5
value 0.00102
scoring_system epss
scoring_elements 0.28191
published_at 2026-04-11T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28456
published_at 2026-04-13T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-12T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33283
published_at 2026-04-21T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33342
published_at 2026-04-16T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49087
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789
reference_id 1108789
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md
reference_id mbedtls-security-advisory-2025-06-5.md
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md
3
reference_url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
reference_id security-advisories
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/
url https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2025-49087
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjdu-ervm-3bcn
17
url VCID-ysr1-padp-a3ff
vulnerability_id VCID-ysr1-padp-a3ff
summary In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-49601
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20218
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.2006
published_at 2026-04-13T12:55:00Z
2
value 0.00065
scoring_system epss
scoring_elements 0.20042
published_at 2026-04-16T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20046
published_at 2026-04-18T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.20275
published_at 2026-04-04T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.19999
published_at 2026-04-07T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.2008
published_at 2026-04-08T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20137
published_at 2026-04-09T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20163
published_at 2026-04-11T12:55:00Z
9
value 0.00065
scoring_system epss
scoring_elements 0.20118
published_at 2026-04-12T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21421
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-49601
1
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788
reference_id 1108788
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788
2
reference_url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md
reference_id mbedtls-security-advisory-2025-06-4.md
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:17:24Z/
url https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md
fixed_packages
0
url pkg:deb/debian/mbedtls@0?distro=trixie
purl pkg:deb/debian/mbedtls@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie
1
url pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5bxk-rknm-zfhc
1
vulnerability VCID-f1fz-b8b6-dfb8
2
vulnerability VCID-gvkn-6e2m-dyez
3
vulnerability VCID-k8w1-nrjy-wfbe
4
vulnerability VCID-kchn-2wez-bbb2
5
vulnerability VCID-pj6w-rufw-nqgd
6
vulnerability VCID-vp4q-81cq-33cw
7
vulnerability VCID-vs6q-c4ug-xfer
8
vulnerability VCID-wsvw-6tmk-3kdj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie
2
url pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
purl pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
1
vulnerability VCID-5bxk-rknm-zfhc
2
vulnerability VCID-7ppw-f9jy-k7ae
3
vulnerability VCID-7v3a-5q44-cucz
4
vulnerability VCID-98cg-wuhp-qudq
5
vulnerability VCID-f1fz-b8b6-dfb8
6
vulnerability VCID-gvkn-6e2m-dyez
7
vulnerability VCID-kchn-2wez-bbb2
8
vulnerability VCID-pj6w-rufw-nqgd
9
vulnerability VCID-vp4q-81cq-33cw
10
vulnerability VCID-vs6q-c4ug-xfer
11
vulnerability VCID-wsvw-6tmk-3kdj
12
vulnerability VCID-zpq1-dwvf-8ka2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie
3
url pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie
4
url pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
purl pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4sbv-dqyv-6baw
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie
aliases CVE-2025-49601
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysr1-padp-a3ff
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie