pam_ssh_agent_auth vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pam_ssh_agent_auth package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
OS Command Injection

<0:0.10.3-7.19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.19.el8_8.2
  • M
OS Command Injection

<0:0.10.3-7.19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.19.el8_8.2
  • M
OS Command Injection

<0:0.10.3-7.19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.19.el8_8.2
  • M
OS Command Injection

<0:0.10.3-7.19.el8_8.2
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.19.el8_8.2
  • M
OS Command Injection

<0:0.10.3-7.15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.15.el8_6.3
  • M
OS Command Injection

<0:0.10.3-7.15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.15.el8_6.3
  • M
OS Command Injection

<0:0.10.3-7.15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.15.el8_6.3
  • M
OS Command Injection

<0:0.10.3-7.15.el8_6.3
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.15.el8_6.3
  • M
Improper Authentication

*
  • M
OS Command Injection

<0:0.10.3-7.19.el8_9.2
  • M
Truncation of Security-relevant Information

<0:0.10.3-7.19.el8_9.2
  • H
Arbitrary Code Injection

<0:0.10.3-7.15.el8_6
  • H
Arbitrary Code Injection

<0:0.10.3-7.7.el8_4.1
  • H
Arbitrary Code Injection

<0:0.10.3-7.19.el8_8
  • H
Arbitrary Code Injection

<0:0.10.3-7.19.el8_8
  • H
Arbitrary Code Injection

<0:0.10.3-7.7.el8_4.1
  • H
Arbitrary Code Injection

<0:0.10.3-7.5.el8_1
  • H
Arbitrary Code Injection

<0:0.10.3-7.15.el8_6
  • H
Arbitrary Code Injection

<0:0.10.3-7.7.el8_4.1
  • H
Arbitrary Code Injection

<0:0.10.3-7.19.el8_8
  • H
Arbitrary Code Injection

<0:0.10.3-7.5.el8_2
  • H
Arbitrary Code Injection

<0:0.10.3-7.15.el8_6
  • H
Arbitrary Code Injection

<0:0.10.3-7.19.el8_8
  • H
Arbitrary Code Injection

<0:0.10.3-7.19.el8_8
  • H
Arbitrary Code Injection

<0:0.10.3-7.5.el8_2
  • H
Arbitrary Code Injection

<0:0.10.3-7.5.el8_2
  • H
Arbitrary Code Injection

<0:0.10.3-7.15.el8_6
  • L
Information Exposure

*
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
Improper Check for Dropped Privileges

<0:0.10.3-7.13.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
User Interface (UI) Misrepresentation of Critical Information

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Improper Input Validation

<0:0.10.3-7.3.el8
  • M
Arbitrary Command Injection

<0:0.10.3-7.24.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • M
Information Exposure

<0:0.10.3-7.10.el8
  • L
User Interface (UI) Misrepresentation of Critical Information

*
  • L
Information Exposure

*