Vulnerabilities > Dropbear SSH Project > Dropbear SSH > 2016.74

DATE CVE VULNERABILITY TITLE RISK
2023-12-18 CVE-2023-48795 Improper Validation of Integrity Check Value vulnerability in multiple products
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack.
5.9
2022-10-12 CVE-2021-36369 Improper Authentication vulnerability in multiple products
An issue was discovered in Dropbear through 2020.81.
network
low complexity
dropbear-ssh-project debian CWE-287
7.5
2021-02-25 CVE-2020-36254 Unspecified vulnerability in Dropbear SSH Project Dropbear SSH
scp.c in Dropbear before 2020.79 mishandles the filename of .
6.8
2020-12-30 CVE-2019-12953 Information Exposure vulnerability in Dropbear SSH Project Dropbear SSH
Dropbear 2011.54 through 2018.76 has an inconsistent failure delay that may lead to revealing valid usernames, a different issue than CVE-2018-15599.
network
low complexity
dropbear-ssh-project CWE-200
5.0
2018-08-21 CVE-2018-15599 Information Exposure vulnerability in multiple products
The recv_msg_userauth_request function in svr-auth.c in Dropbear through 2018.76 is prone to a user enumeration vulnerability because username validity affects how fields in SSH_MSG_USERAUTH messages are handled, a similar issue to CVE-2018-15473 in an unrelated codebase.
network
low complexity
debian dropbear-ssh-project CWE-200
5.0
2017-05-19 CVE-2017-9079 Incorrect Permission Assignment for Critical Resource vulnerability in multiple products
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option.
4.7
2017-05-19 CVE-2017-9078 Double Free vulnerability in multiple products
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
8.5