Lookup for vulnerable packages by Package URL.

GET /api/packages/930541?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "mbedtls",
    "version": "0",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "2.4.2-1",
    "latest_non_vulnerable_version": "3.6.4-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/203718?format=api",
            "vulnerability_id": "VCID-33uw-hd5z-g7dq",
            "summary": "An issue was discovered in Mbed TLS 3.6 before 3.6.1. A stack buffer overflow in mbedtls_ecdsa_der_to_raw() and mbedtls_ecdsa_raw_to_der() can occur when the bits parameter is larger than the largest supported curve. In some configurations with PSA disabled, all values of bits are affected. (This never happens in internal library calls, but can affect applications that call these functions directly.)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45158",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71795",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71689",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71675",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71709",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71742",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71708",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71737",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71568",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71585",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71558",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71598",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71609",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71632",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71616",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71643",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71647",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7163",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7168",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00681",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71685",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45158"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-2/",
                    "reference_id": "mbedtls-security-advisory-2024-08-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-2/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/",
                    "reference_id": "releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-06T18:15:25Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-45158"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-33uw-hd5z-g7dq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/203618?format=api",
            "vulnerability_id": "VCID-4sbv-dqyv-6baw",
            "summary": "An issue was discovered in Mbed TLS before 2.28.9 and 3.x before 3.6.1, in which the user-selected algorithm is not used. Unlike previously documented, enabling MBEDTLS_PSA_HMAC_DRBG_MD_TYPE does not cause the PSA subsystem to use HMAC_DRBG: it uses HMAC_DRBG only when MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG and MBEDTLS_CTR_DRBG_C are disabled.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36864",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3687",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36752",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36819",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36843",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36766",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36788",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3737",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37396",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37224",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37275",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37289",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37299",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37266",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37238",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37284",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37267",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37213",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36989",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00163",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36957",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45157"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/",
                    "reference_id": "mbedtls-security-advisory-2024-08-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-1/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/",
                    "reference_id": "releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-05T20:29:47Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930563?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-45157"
            ],
            "risk_score": 2.3,
            "exploitability": "0.5",
            "weighted_severity": "4.6",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4sbv-dqyv-6baw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/185952?format=api",
            "vulnerability_id": "VCID-64rr-rrmq-nkh6",
            "summary": "In Mbed TLS 3.3.0 through 3.5.2 before 3.6.0, a malicious client can cause information disclosure or a denial of service because of a stack buffer over-read (of less than 256 bytes) in a TLS 1.3 server via a TLS 3.1 ClientHello.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-30166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57419",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57315",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57379",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57329",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57354",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57336",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57358",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57335",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57386",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57389",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57404",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57384",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57363",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5739",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57385",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57319",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57342",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57322",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00348",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57272",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-30166"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-01T14:09:37Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0",
                    "reference_id": "v3.6.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-01T14:09:37Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-30166"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64rr-rrmq-nkh6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/187343?format=api",
            "vulnerability_id": "VCID-84ba-26t7-eyf8",
            "summary": "An issue was discovered in Mbed TLS 3.5.1. There is persistent handshake denial if a client sends a TLS 1.3 ClientHello without extensions.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23744",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15331",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15211",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15254",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15301",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15371",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15174",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15263",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15313",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15283",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15179",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15093",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15101",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15151",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1519",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15194",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15137",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15008",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15133",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15227",
                            "published_at": "2026-05-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-23744"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/issues/8694",
                    "reference_id": "8694",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-26T17:45:29Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/issues/8694"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-23744"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-84ba-26t7-eyf8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/197712?format=api",
            "vulnerability_id": "VCID-9615-yuce-qye3",
            "summary": "Mbed TLS 3.5.x through 3.6.x before 3.6.2 has a buffer underrun in pkwrite when writing an opaque key pair",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-49195",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77126",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77023",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77052",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77073",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77059",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77076",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76885",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76897",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76929",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76939",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76967",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76946",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76942",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76983",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76985",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76978",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77012",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77019",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00996",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77032",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-49195"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-10-1/",
                    "reference_id": "mbedtls-security-advisory-2024-10-1",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-17T17:16:25Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-10-1/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-17T17:16:25Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930563?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-49195"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9615-yuce-qye3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61258?format=api",
            "vulnerability_id": "VCID-cbdd-4dr5-53f6",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80936",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80685",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8074",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80748",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80765",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80749",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80778",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8078",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80781",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80804",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80808",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80822",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80838",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8086",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80881",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80875",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80894",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036"
                },
                {
                    "reference_url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf"
                },
                {
                    "reference_url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/"
                },
                {
                    "reference_url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3468"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8036",
                    "reference_id": "CVE-2015-8036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8036"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-8036"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbdd-4dr5-53f6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32153?format=api",
            "vulnerability_id": "VCID-ct4s-c1rd-suhj",
            "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45450",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19084",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00062",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18968",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21053",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21141",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21119",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21138",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00069",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21217",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21837",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21779",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21781",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2175",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21752",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21605",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21599",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21787",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21914",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21733",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2181",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21866",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00071",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21877",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45450"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202301-08",
                    "reference_id": "GLSA-202301-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202301-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45450"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ct4s-c1rd-suhj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/305965?format=api",
            "vulnerability_id": "VCID-d8d5-v1dc-kyfp",
            "summary": "An issue was discovered in Mbed TLS through 3.5.1. In mbedtls_ssl_session_reset, the maximum negotiable TLS version is mishandled. For example, if the last connection negotiated TLS 1.2, then 1.2 becomes the new maximum.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16373",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16187",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16295",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16265",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16299",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16473",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16536",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16332",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16418",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16477",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16461",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16421",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1636",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16296",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16316",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16199",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16071",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16809",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16715",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00054",
                            "scoring_system": "epss",
                            "scoring_elements": "0.167",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-52353"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/issues/8654",
                    "reference_id": "8654",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:18:23Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/issues/8654"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-52353"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8d5-v1dc-kyfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56859?format=api",
            "vulnerability_id": "VCID-dvwa-tj33-h3em",
            "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45199",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92823",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9271",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92714",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92725",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92729",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92735",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92734",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92733",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92745",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9275",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92757",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92753",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92762",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92775",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92787",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92792",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.09273",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92798",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45199"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-14",
                    "reference_id": "GLSA-202409-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-14"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/",
                    "reference_id": "mbedtls-security-advisory-2023-10-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-09-19T15:42:54Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2023-10-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-45199"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvwa-tj33-h3em"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39979?format=api",
            "vulnerability_id": "VCID-gzvn-8b6y-xqeb",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84041",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83806",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8382",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83846",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83852",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83891",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83892",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83918",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83925",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83952",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83974",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8399",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84006",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036"
                },
                {
                    "reference_url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf"
                },
                {
                    "reference_url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/"
                },
                {
                    "reference_url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3468"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5291",
                    "reference_id": "CVE-2015-5291",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5291"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-18",
                    "reference_id": "GLSA-201706-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-18"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2015-5291"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gzvn-8b6y-xqeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/201701?format=api",
            "vulnerability_id": "VCID-hxpy-59gj-dygh",
            "summary": "An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When negotiating the TLS version on the server side, it can fall back to the TLS 1.2 implementation of the protocol if it is disabled. If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 client could put a TLS 1.3-only server into an infinite loop processing a TLS 1.2 ClientHello, resulting in a denial of service. If the TLS 1.2 implementation was disabled at runtime, a TLS 1.2 client can successfully establish a TLS 1.2 connection with the server.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29415",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2938",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29394",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29315",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29335",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29899",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29947",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29759",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2982",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29865",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29819",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29768",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29787",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29767",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29642",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29528",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29465",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00113",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29318",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-28836"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T15:03:49Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0",
                    "reference_id": "v3.6.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-03T15:03:49Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-28836"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxpy-59gj-dygh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/202995?format=api",
            "vulnerability_id": "VCID-mxn3-8deq-t3a1",
            "summary": "An issue was discovered in Mbed TLS 3.x before 3.6.1. With TLS 1.3, when a server enables optional authentication of the client, if the client-provided certificate does not have appropriate values in if keyUsage or extKeyUsage extensions, then the return value of mbedtls_ssl_get_verify_result() would incorrectly have the MBEDTLS_X509_BADCERT_KEY_USAGE and MBEDTLS_X509_BADCERT_KEY_USAGE bits clear. As a result, an attacker that had a certificate valid for uses other than TLS client authentication would nonetheless be able to use it for TLS client authentication. Only TLS 1.3 servers were affected, and only with optional authentication (with required authentication, the handshake would be aborted with a fatal alert).",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6895",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68848",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68826",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68869",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68904",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6887",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68896",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68708",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68727",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68705",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68757",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68799",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68785",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68797",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68808",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68786",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68835",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00575",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68841",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-45159"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/",
                    "reference_id": "mbedtls-security-advisory-2024-08-3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2024-08-3/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/",
                    "reference_id": "releases",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-02-03T18:17:13Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2024-45159"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mxn3-8deq-t3a1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/261976?format=api",
            "vulnerability_id": "VCID-nbdz-1xnh-5kf7",
            "summary": "In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45451",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34486",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34704",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3473",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34607",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34651",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34679",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34684",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34644",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3462",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34659",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34646",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34605",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34369",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3435",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34133",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34198",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34235",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34129",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34156",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34226",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-45451"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-45451"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nbdz-1xnh-5kf7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349238?format=api",
            "vulnerability_id": "VCID-ph4w-4hud-mkck",
            "summary": "An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue affects the public multipart CCM API in Mbed TLS 3.x, where mbedtls_ccm_finish() can be invoked directly by applications. In Mbed TLS 4.x versions prior to the fix, the same missing validation exists in the internal implementation; however, the function is not exposed as part of the public API. Exploitation requires application-level invocation of the multipart CCM API.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03384",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00017",
                            "scoring_system": "epss",
                            "scoring_elements": "0.03993",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0492",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0474",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04959",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04885",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04821",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04832",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04798",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04778",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00018",
                            "scoring_system": "epss",
                            "scoring_elements": "0.04731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.06676",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07592",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07487",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07554",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07536",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07553",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00026",
                            "scoring_system": "epss",
                            "scoring_elements": "0.07337",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34876"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34876"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577",
                    "reference_id": "1132577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-ccm-finish-boundary-check/",
                    "reference_id": "mbedtls-security-advisory-2026-03-ccm-finish-boundary-check",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-02T15:53:54Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-ccm-finish-boundary-check/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-02T15:53:54Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-34876"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph4w-4hud-mkck"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56857?format=api",
            "vulnerability_id": "VCID-rv8h-z3cy-yucb",
            "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46393",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74278",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74329",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74251",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74292",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.743",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7432",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74299",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00815",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74284",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74522",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74424",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74453",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74479",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74445",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00818",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74466",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00868",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75197",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00868",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75242",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00868",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75238",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00868",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75235",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00868",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75207",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-46393"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/",
                    "reference_id": "4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4BR7ZCVKLPGCOEEALUHZMFHXQHR6S4QL/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/",
                    "reference_id": "6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XMKJ5IMJEPXYAHHU56Z4P2FSYIEAESB/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202409-14",
                    "reference_id": "GLSA-202409-14",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202409-14"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2",
                    "reference_id": "v2.28.2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0",
                    "reference_id": "v3.3.0",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:31:43Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.3.0"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930559?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.2-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-46393"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rv8h-z3cy-yucb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32149?format=api",
            "vulnerability_id": "VCID-wpu6-c26t-4ufn",
            "summary": "Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32922",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32958",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32779",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32827",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32857",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32819",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32794",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32837",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32814",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32628",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32512",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3243",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32295",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32359",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32369",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32277",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32299",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00133",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32366",
                            "published_at": "2026-05-14T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-36477"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202301-08",
                    "reference_id": "GLSA-202301-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202301-08"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930554?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.0-0.3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.0-0.3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2020-36477"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpu6-c26t-4ufn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/349242?format=api",
            "vulnerability_id": "VCID-x8et-cun9-6kgz",
            "summary": "An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.22724",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00114",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29953",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35266",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35555",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35244",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35504",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35559",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35584",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35549",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35526",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0015",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35565",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00203",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42212",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44594",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44538",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44556",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44493",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44522",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44468",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-34877"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34877",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34877"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577",
                    "reference_id": "1132577",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132577"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-serialized-data/",
                    "reference_id": "mbedtls-security-advisory-2026-03-serialized-data",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:51:48Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/mbedtls-security-advisory-2026-03-serialized-data/"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2026-04-02T17:51:48Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2026-34877"
            ],
            "risk_score": 2.5,
            "exploitability": "0.5",
            "weighted_severity": "4.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8et-cun9-6kgz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266553?format=api",
            "vulnerability_id": "VCID-xa5h-khas-8ybs",
            "summary": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_verify may accept invalid signatures if hash computation fails and internal errors go unchecked, enabling LMS (Leighton-Micali Signature) forgery in a fault scenario. Specifically, unchecked return values in mbedtls_lms_verify allow an attacker (who can induce a hardware hash accelerator fault) to bypass LMS signature verification by reusing stale stack data, resulting in acceptance of an invalid signature. In mbedtls_lms_verify, the return values of the internal Merkle tree functions create_merkle_leaf_value and create_merkle_internal_value are not checked. These functions return an integer that indicates whether the call succeeded or not. If a failure occurs, the output buffer (Tc_candidate_root_node) may remain uninitialized, and the result of the signature verification is unpredictable. When the software implementation of SHA-256 is used, these functions will not fail. However, with hardware-accelerated hashing, an attacker could use fault injection against the accelerator to bypass verification.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49600",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02348",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02346",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02345",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02329",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02335",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02439",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02425",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02414",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02471",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02359",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02356",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.0236",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02381",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.02358",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14239",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1421",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14198",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14334",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13966",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14123",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49600"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787",
                    "reference_id": "1108787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108787"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md",
                    "reference_id": "mbedtls-security-advisory-2025-06-3.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:18:22Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-3.md"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930566?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-49600"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xa5h-khas-8ybs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266523?format=api",
            "vulnerability_id": "VCID-yjdu-ervm-3bcn",
            "summary": "In Mbed TLS 3.6.1 through 3.6.3 before 3.6.4, a timing discrepancy in block cipher padding removal allows an attacker to recover the plaintext when PKCS#7 padding mode is used.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00061",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28074",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28191",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28183",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00102",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2814",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28456",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00105",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28505",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32919",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33283",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33131",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33114",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33037",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33342",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00136",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33319",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34899",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34925",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34995",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00149",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34958",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49087"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789",
                    "reference_id": "1108789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108789"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md",
                    "reference_id": "mbedtls-security-advisory-2025-06-5.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-5.md"
                },
                {
                    "reference_url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
                    "reference_id": "security-advisories",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-21T18:13:55Z/"
                        }
                    ],
                    "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930566?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-49087"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yjdu-ervm-3bcn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/266531?format=api",
            "vulnerability_id": "VCID-ysr1-padp-a3ff",
            "summary": "In MbedTLS 3.3.0 before 3.6.4, mbedtls_lms_import_public_key does not check that the input buffer is at least 4 bytes before reading a 32-bit field, allowing a possible out-of-bounds read on truncated input. Specifically, an out-of-bounds read in mbedtls_lms_import_public_key allows context-dependent attackers to trigger a crash or limited adjacent-memory disclosure by supplying a truncated LMS (Leighton-Micali Signature) public-key buffer under four bytes. An LMS public key starts with a 4-byte type indicator. The function mbedtls_lms_import_public_key reads this type indicator before validating the size of its input.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20218",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20275",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19999",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2008",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20137",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20163",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20118",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2006",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20042",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.20046",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21272",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21273",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.21421",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0007",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2125",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48728",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48835",
                            "published_at": "2026-05-14T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48781",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48759",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48692",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00255",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48754",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-49601"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788",
                    "reference_id": "1108788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108788"
                },
                {
                    "reference_url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md",
                    "reference_id": "mbedtls-security-advisory-2025-06-4.md",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:17:24Z/"
                        }
                    ],
                    "url": "https://github.com/Mbed-TLS/mbedtls-docs/blob/main/security-advisories/mbedtls-security-advisory-2025-06-4.md"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930541?format=api",
                    "purl": "pkg:deb/debian/mbedtls@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930542?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.16.9-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-k8w1-nrjy-wfbe"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.16.9-0.1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930540?format=api",
                    "purl": "pkg:deb/debian/mbedtls@2.28.3-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-5bxk-rknm-zfhc"
                        },
                        {
                            "vulnerability": "VCID-7ppw-f9jy-k7ae"
                        },
                        {
                            "vulnerability": "VCID-7v3a-5q44-cucz"
                        },
                        {
                            "vulnerability": "VCID-98cg-wuhp-qudq"
                        },
                        {
                            "vulnerability": "VCID-f1fz-b8b6-dfb8"
                        },
                        {
                            "vulnerability": "VCID-gvkn-6e2m-dyez"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-kchn-2wez-bbb2"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-pj6w-rufw-nqgd"
                        },
                        {
                            "vulnerability": "VCID-vp4q-81cq-33cw"
                        },
                        {
                            "vulnerability": "VCID-vs6q-c4ug-xfer"
                        },
                        {
                            "vulnerability": "VCID-wsvw-6tmk-3kdj"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        },
                        {
                            "vulnerability": "VCID-zpq1-dwvf-8ka2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@2.28.3-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930566?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.4-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.4-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930544?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/930543?format=api",
                    "purl": "pkg:deb/debian/mbedtls@3.6.5-0.1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4sbv-dqyv-6baw"
                        },
                        {
                            "vulnerability": "VCID-jeen-6u3v-8qab"
                        },
                        {
                            "vulnerability": "VCID-ph4w-4hud-mkck"
                        },
                        {
                            "vulnerability": "VCID-x8et-cun9-6kgz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@3.6.5-0.1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2025-49601"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysr1-padp-a3ff"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mbedtls@0%3Fdistro=trixie"
}