openssh-clients

Direct Vulnerabilities

Known vulnerabilities in the openssh-clients package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Misinterpretation of Input

*
  • L
Missing Authentication for Critical Function

*
  • H
Improper Preservation of Permissions

*
  • L
OS Command Injection

*
  • M
Improper Handling of Inconsistent Special Elements

*
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Expected Behavior Violation

*
  • M
Detection of Error Condition Without Action

*
  • M
Improper Authentication

*
  • M
OS Command Injection

*
  • M
Truncation of Security-relevant Information

*
  • H
Arbitrary Code Injection

<0:7.4p1-23.el7_9
  • M
Improper Check for Dropped Privileges

<0:7.4p1-22.el7_9
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Incorrect Authorization

<0:6.6.1p1-31.el7
  • M
Improper Access Control

<0:6.6.1p1-25.el7_2
  • M
Improper Input Validation

<0:6.6.1p1-25.el7_2
  • M
Heap-based Buffer Overflow

<0:6.6.1p1-23.el7_2
  • M
Incorrect Calculation

<0:6.6.1p1-23.el7_2
  • M
Missing Critical Step in Authentication

<0:6.6.1p1-22.el7
  • M
Use After Free

<0:6.6.1p1-22.el7
  • M
Incorrect Privilege Assignment

<0:6.6.1p1-22.el7
  • M
Improper Authentication

<0:6.6.1p1-11.el7
  • M
Improper Authentication

<0:6.6.1p1-11.el7
  • L
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Arbitrary Command Injection

*
  • M
Information Exposure

*
  • M
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Information Exposure

*