openssh-clients vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the openssh-clients package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Neutralization of Null Byte or NUL Character

*
  • M
Failure to Sanitize Special Element

*
  • M
Expected Behavior Violation

*
  • M
Detection of Error Condition Without Action

<0:8.0p1-26.el8_10
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_8.2
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
OS Command Injection

<0:8.0p1-15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:8.0p1-15.el8_6.3
  • M
Improper Authentication

*
  • M
OS Command Injection

<0:8.0p1-19.el8_9.2
  • M
Truncation of Security-relevant Information

<0:8.0p1-19.el8_9.2
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-7.el8_4
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-15.el8_6
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_1.1
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-5.el8_2
  • H
Arbitrary Code Injection

<0:8.0p1-19.el8_8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
Improper Check for Dropped Privileges

<0:8.0p1-13.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Improper Input Validation

<0:8.0p1-3.el8
  • M
Arbitrary Command Injection

<0:8.0p1-24.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
Information Exposure

<0:8.0p1-10.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

*
  • M
Information Exposure

*