Direct Vulnerabilities

Known vulnerabilities in the openssh package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Always-Incorrect Control Flow Implementation

[0,)
  • H
Improper Preservation of Permissions

[0,)
  • L
Incorrect Behavior Order

[0,)
  • L
Unprotected Alternate Channel

[0,)
  • L
Always-Incorrect Control Flow Implementation

[0,)
  • L
Improper Neutralization of Null Byte or NUL Character

[0,)
  • L
Improper Handling of Invalid Use of Special Elements

[0,)
  • M
Expected Behavior Violation

[0,)
  • H
Allocation of Resources Without Limits or Throttling

[0,)
  • H
Detection of Error Condition Without Action

[0,)
  • C
Race Condition

[9.1p1,9.9p1)
  • H
Improper Isolation or Compartmentalization

[0,)
  • M
Missing Critical Step in Authentication

[0,)
  • M
OS Command Injection

[0,)
  • M
Authentication Bypass by Capture-replay

[0,)
  • H
Arbitrary Code Injection

[0,)
  • M
Allocation of Resources Without Limits or Throttling

[0,)
  • M
Double Free

[0,)
  • M
Information Exposure

[0,)
  • C
Buffer Overflow

[0,)
  • M
Information Exposure

[0,)
  • M
Denial of Service (DoS)

[0,)
  • H
Race Condition

[0,)
  • M
Information Exposure

[0,)
  • H
Cross-site Scripting (XSS)

[0,)
  • M
Information Exposure

[0,)
  • M
CVE-2005-2797

[0,)
  • C
Denial of Service (DoS)

[0,)
  • C
CVE-2000-0999

[0,)
  • M
Arbitrary Code Execution

[0,)
  • H
Access Restriction Bypass

[0,)
  • M
Cryptographic Issues

[0,)
  • M
Improper Authentication

[0,)
  • M
Access Restriction Bypass

[0,)
  • L
Insufficiently Protected Credentials

[0,)
  • L
Information Exposure

[0,)
  • H
Improper Input Validation

[0,)
  • H
Remote Code Execution (RCE)

[0,)
  • H
Improper Input Validation

[0,)
  • M
Access Restriction Bypass

[0,)
  • H
Information Exposure

[0,)
  • M
Access Restriction Bypass

[0,)
  • C
Arbitrary Code Execution

[0,)
  • C
Arbitrary Code Execution

[0,)
  • C
CVE-2000-0525

[0,)