Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dropbear ssh project dropbear ssh vulnerabilities and exploits
(subscribe to this query)
2.1
CVSSv2
CVE-2016-7409
The dbclient and server in Dropbear SSH prior to 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
Dropbear Ssh Project Dropbear Ssh
10
CVSSv2
CVE-2016-7406
Format string vulnerability in Dropbear SSH prior to 2016.74 allows remote malicious users to execute arbitrary code via format string specifiers in the (1) username or (2) host argument.
Dropbear Ssh Project Dropbear Ssh
5.5
CVSSv2
CVE-2016-3116
CRLF injection vulnerability in Dropbear SSH prior to 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
5
CVSSv2
CVE-2013-4421
The buf_decompress function in packet.c in Dropbear SSH Server prior to 2013.59 allows remote malicious users to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
Dropbear Ssh Project Dropbear Ssh
5
CVSSv2
CVE-2013-4434
Dropbear SSH Server prior to 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote malicious users to discover valid usernames.
Dropbear Ssh Project Dropbear Ssh
1 Github repository
7.1
CVSSv2
CVE-2012-0920
Use-after-free vulnerability in Dropbear SSH Server 0.52 up to and including 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command reque...
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 6.0
Debian Debian Linux 7.0
7.5
CVSSv2
CVE-2007-1099
dbclient in Dropbear SSH client prior to 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote malicious users to conduct man-in-the-middle attacks.
Dropbear Ssh Project Dropbear Ssh
5
CVSSv2
CVE-2006-1206
Matt Johnston Dropbear SSH server 0.47 and previous versions, as used in embedded Linux devices and on general-purpose operating systems, allows remote malicious users to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds...
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
6.5
CVSSv2
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.0
Debian Debian Linux 3.1
7.5
CVSSv2
CVE-2004-2486
The DSS verification code in Dropbear SSH Server prior to 0.43 frees uninitialized variables, which might allow remote malicious users to gain access.
Dropbear Ssh Project Dropbear Ssh
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3201
CVE-2024-4779
CVE-2024-35090
CVE-2024-5084
hard-coded
CVE-2024-4985
HTML injection
CVE-2024-33655
local file inclusion
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2