openssh-cavs vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssh-cavs package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Detection of Error Condition Without Action

*
  • H
Arbitrary Code Injection

<0:7.4p1-23.el7_9
  • M
Improper Check for Dropped Privileges

<0:7.4p1-22.el7_9
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Improper Authentication

*
  • M
OS Command Injection

*
  • M
Truncation of Security-relevant Information

*
  • H
Arbitrary Code Injection

<0:7.4p1-23.el7_9
  • L
Information Exposure

*
  • M
Improper Check for Dropped Privileges

<0:7.4p1-22.el7_9
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Information Exposure

<0:7.4p1-21.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • L
Improper Input Validation

<0:7.4p1-16.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • M
Covert Timing Channel

<0:7.4p1-11.el7
  • L
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Allocation of Resources Without Limits or Throttling

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Improper Input Validation

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Untrusted Search Path

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Information Exposure

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Improper Authentication

<0:7.4p1-11.el7
  • M
Arbitrary Command Injection

*
  • M
Information Exposure

*
  • M
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Information Exposure

*