Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/dropbear@2022.82-1?distro=trixie
Typedeb
Namespacedebian
Namedropbear
Version2022.82-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2022.83-1+deb12u1
Latest_non_vulnerable_version2025.89-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9pmf-w3x7-5ugr
vulnerability_id VCID-9pmf-w3x7-5ugr
summary An issue was discovered in Dropbear through 2020.81. Due to a non-RFC-compliant check of the available authentication methods in the client-side SSH code, it is possible for an SSH server to change the login process in its favor. This attack can bypass additional security measures such as FIDO2 tokens or SSH-Askpass. Thus, it allows an attacker to abuse a forwarded agent for logging on to another server unnoticed.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-36369
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.34455
published_at 2026-04-04T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34427
published_at 2026-04-02T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34091
published_at 2026-04-01T12:55:00Z
3
value 0.00145
scoring_system epss
scoring_elements 0.34537
published_at 2026-04-26T12:55:00Z
4
value 0.00145
scoring_system epss
scoring_elements 0.34875
published_at 2026-04-09T12:55:00Z
5
value 0.00145
scoring_system epss
scoring_elements 0.34879
published_at 2026-04-11T12:55:00Z
6
value 0.00145
scoring_system epss
scoring_elements 0.34841
published_at 2026-04-12T12:55:00Z
7
value 0.00145
scoring_system epss
scoring_elements 0.34817
published_at 2026-04-13T12:55:00Z
8
value 0.00145
scoring_system epss
scoring_elements 0.34856
published_at 2026-04-16T12:55:00Z
9
value 0.00145
scoring_system epss
scoring_elements 0.34839
published_at 2026-04-18T12:55:00Z
10
value 0.00145
scoring_system epss
scoring_elements 0.34795
published_at 2026-04-21T12:55:00Z
11
value 0.00145
scoring_system epss
scoring_elements 0.34558
published_at 2026-04-24T12:55:00Z
12
value 0.00145
scoring_system epss
scoring_elements 0.34802
published_at 2026-04-07T12:55:00Z
13
value 0.00145
scoring_system epss
scoring_elements 0.34846
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-36369
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36369
2
reference_url https://github.com/mkj/dropbear/pull/128
reference_id 128
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-15T18:45:18Z/
url https://github.com/mkj/dropbear/pull/128
3
reference_url https://github.com/mkj/dropbear/releases/tag/DROPBEAR_2022.82
reference_id DROPBEAR_2022.82
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-15T18:45:18Z/
url https://github.com/mkj/dropbear/releases/tag/DROPBEAR_2022.82
4
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00015.html
reference_id msg00015.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-15T18:45:18Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00015.html
5
reference_url https://github.com/mkj/dropbear/releases
reference_id releases
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-15T18:45:18Z/
url https://github.com/mkj/dropbear/releases
6
reference_url https://usn.ubuntu.com/7292-1/
reference_id USN-7292-1
reference_type
scores
url https://usn.ubuntu.com/7292-1/
fixed_packages
0
url pkg:deb/debian/dropbear@2020.81-3%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/dropbear@2020.81-3%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2020.81-3%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/dropbear@2020.81-3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/dropbear@2020.81-3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2020.81-3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/dropbear@2022.82-1?distro=trixie
purl pkg:deb/debian/dropbear@2022.82-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2022.82-1%3Fdistro=trixie
3
url pkg:deb/debian/dropbear@2022.83-1%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/dropbear@2022.83-1%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2022.83-1%252Bdeb12u3%3Fdistro=trixie
4
url pkg:deb/debian/dropbear@2025.89-1~deb13u1?distro=trixie
purl pkg:deb/debian/dropbear@2025.89-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2025.89-1~deb13u1%3Fdistro=trixie
5
url pkg:deb/debian/dropbear@2025.89-1?distro=trixie
purl pkg:deb/debian/dropbear@2025.89-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2025.89-1%3Fdistro=trixie
aliases CVE-2021-36369
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pmf-w3x7-5ugr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/dropbear@2022.82-1%3Fdistro=trixie