python-paramiko vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-paramiko package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • M
Truncation of Security-relevant Information

*
  • M
Truncation of Security-relevant Information

*
  • H
Improper Access Control

<0:2.1.1-2.el7ae
  • M
Cross-site Scripting (XSS)

<0:2.1.1-2.el7ae
  • M
Improper Certificate Validation

<0:1.15.2-3.el7
  • M
Use of Hard-coded Credentials

<0:1.15.2-3.el7
  • H
Improper Input Validation

<0:2.1.1-4.el7
  • H
Improper Input Validation

<0:2.1.1-4.el7
  • H
Incorrect Privilege Assignment

<0:2.1.1-4.el7
  • H
Incorrect Privilege Assignment

<0:2.1.1-4.el7
  • M
Improper Input Validation

<0:2.1.1-2.el7
  • M
Improper Authentication

<0:2.1.1-2.el7
  • M
Improper Authorization

<0:2.1.1-2.el7
  • M
Cross-site Scripting (XSS)

<0:2.1.1-2.el7ae
  • M
Race Condition

*
  • M
Race Condition

*
  • M
Race Condition

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • L
Improper Authentication

*
  • H
Improper Authentication

<0:2.1.1-4.el7
  • L
Improper Authentication

<0:2.1.1-4.el7
  • C
Improper Authentication

<0:2.1.1-4.el7
  • L
Improper Authentication

*
  • H
Improper Authentication

<0:2.1.1-4.el7
  • L
Improper Authentication

<0:2.1.1-4.el7
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • L
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • L
Authentication Bypass by Primary Weakness

*
  • C
Authentication Bypass by Primary Weakness

<0:2.1.1-9.el7
  • L
Authentication Bypass by Primary Weakness

*
  • L
Authentication Bypass by Primary Weakness

*