Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-40913
PUBLISHED
More InfoOfficial Page
Assigner-CPANSec
Assigner Org ID-9b29abf9-4ab0-4765-b253-1875cd9b441e
View Known Exploited Vulnerability (KEV) details
Published At-16 Jul, 2025 | 14:05
Updated At-16 Jul, 2025 | 20:50
Rejected At-
▼CVE Numbering Authority (CNA)
Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow

Net::Dropbear versions through 0.16 for Perl contains a dependency that may be susceptible to an integer overflow. Net::Dropbear embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.

Affected Products
Vendor
ATRODO
Product
Net::Dropbear
Collection URL
https://cpan.org/modules
Package Name
Net-Dropbear
Repo
https://github.com/atrodo/Net-Dropbear
Default Status
unaffected
Versions
Affected
  • From 0.01 through 0.16 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1395CWE-1395 Dependency on Vulnerable Third-Party Component
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cve.org/CVERecord?id=CVE-2023-36328
N/A
https://github.com/libtom/libtommath/pull/546
N/A
https://github.com/advisories/GHSA-j3xv-6967-cv88
N/A
https://metacpan.org/release/ATRODO/Net-Dropbear-0.16/source/dropbear/libtommath/bn_mp_grow.c
N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found