Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dropbear ssh project dropbear ssh vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-7407
The dropbearconvert command in Dropbear SSH prior to 2016.74 allows malicious users to execute arbitrary code via a crafted OpenSSH key file.
Dropbear Ssh Project Dropbear Ssh
8.8
CVSSv3
CVE-2016-7408
The dbclient in Dropbear SSH prior to 2016.74 allows remote malicious users to execute arbitrary code via a crafted (1) -m or (2) -c argument.
Dropbear Ssh Project Dropbear Ssh
6.4
CVSSv3
CVE-2016-3116
CRLF injection vulnerability in Dropbear SSH prior to 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
NA
CVE-2013-4421
The buf_decompress function in packet.c in Dropbear SSH Server prior to 2013.59 allows remote malicious users to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
Dropbear Ssh Project Dropbear Ssh
NA
CVE-2013-4434
Dropbear SSH Server prior to 2013.59 generates error messages for a failed logon attempt with different time delays depending on whether the user account exists, which allows remote malicious users to discover valid usernames.
Dropbear Ssh Project Dropbear Ssh
1 Github repository
NA
CVE-2012-0920
Use-after-free vulnerability in Dropbear SSH Server 0.52 up to and including 2012.54, when command restriction and public key authentication are enabled, allows remote authenticated users to execute arbitrary code and bypass command restrictions via multiple crafted command reque...
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 6.0
Debian Debian Linux 7.0
NA
CVE-2007-1099
dbclient in Dropbear SSH client prior to 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote malicious users to conduct man-in-the-middle attacks.
Dropbear Ssh Project Dropbear Ssh
NA
CVE-2006-1206
Matt Johnston Dropbear SSH server 0.47 and previous versions, as used in embedded Linux devices and on general-purpose operating systems, allows remote malicious users to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds...
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
NA
CVE-2005-4178
Buffer overflow in Dropbear server prior to 0.47 allows authenticated users to execute arbitrary code via unspecified inputs that cause insufficient memory to be allocated due to an incorrect expression that does not enforce the proper order of operations.
Dropbear Ssh Project Dropbear Ssh
Debian Debian Linux 3.0
Debian Debian Linux 3.1
NA
CVE-2004-2486
The DSS verification code in Dropbear SSH Server prior to 0.43 frees uninitialized variables, which might allow remote malicious users to gain access.
Dropbear Ssh Project Dropbear Ssh
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
malicious code
camera
CVE-2023-46694
CVE-2023-43847
CVE-2023-30311
CVE-2024-27842
CVE-2024-30165
arbitrary code
CVE-2024-21683
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2