Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dropbear ssh project dropbear ssh vulnerabilities and exploits
(subscribe to this query)
6.4
CVSSv3
CVE-2016-3116
CRLF injection vulnerability in Dropbear SSH prior to 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
8.1
CVSSv3
CVE-2020-36254
scp.c in Dropbear prior to 2020.79 mishandles the filename of . or an empty filename, a related issue to CVE-2018-20685.
Dropbear Ssh Project Dropbear Ssh
1 Github repository
5.3
CVSSv3
CVE-2019-12953
Dropbear 2011.54 up to and including 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
Dropbear Ssh Project Dropbear Ssh
NA
CVE-2013-4421
The buf_decompress function in packet.c in Dropbear SSH Server prior to 2013.59 allows remote malicious users to cause a denial of service (memory consumption) via a compressed packet that has a large size when it is decompressed.
Dropbear Ssh Project Dropbear Ssh
7.5
CVSSv3
CVE-2017-2659
It was found that dropbear before version 2013.59 with GSSAPI leaks whether given username is valid or invalid. When an invalid username is given, the GSSAPI authentication failure was incorrectly counted towards the maximum allowed number of password attempts.
Dropbear Ssh Project Dropbear Ssh
NA
CVE-2006-1206
Matt Johnston Dropbear SSH server 0.47 and previous versions, as used in embedded Linux devices and on general-purpose operating systems, allows remote malicious users to cause a denial of service (connection slot exhaustion) via a large number of connection attempts that exceeds...
Dropbear Ssh Project Dropbear Ssh
1 EDB exploit
NA
CVE-2007-1099
dbclient in Dropbear SSH client prior to 0.49 does not sufficiently warn the user when it detects a hostkey mismatch, which might allow remote malicious users to conduct man-in-the-middle attacks.
Dropbear Ssh Project Dropbear Ssh
9.8
CVSSv3
CVE-2016-7407
The dropbearconvert command in Dropbear SSH prior to 2016.74 allows malicious users to execute arbitrary code via a crafted OpenSSH key file.
Dropbear Ssh Project Dropbear Ssh
5.5
CVSSv3
CVE-2016-7409
The dbclient and server in Dropbear SSH prior to 2016.74, when compiled with DEBUG_TRACE, allows local users to read process memory via the -v argument, related to a failed remote ident.
Dropbear Ssh Project Dropbear Ssh
NA
CVE-2004-2486
The DSS verification code in Dropbear SSH Server prior to 0.43 frees uninitialized variables, which might allow remote malicious users to gain access.
Dropbear Ssh Project Dropbear Ssh
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49333
CVE-2024-33901
CVE-2024-36001
CVE-2024-2835
firewall
XPath injection
authentication bypass
CVE-2024-22120
CVE-2024-32002
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »