libssh vulnerabilities

Licenses: LGPL-2.1

Direct Vulnerabilities

Known vulnerabilities in the https://red.libssh.org|libssh package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Out-of-bounds Read

[,0.11.4)
  • M
Allocation of Resources Without Limits or Throttling

[,0.11.4)
  • L
Directory Traversal

[,0.11.4)
  • L
Allocation of Resources Without Limits or Throttling

[,0.11.4)
  • M
Buffer Underwrite (Buffer Underflow)

[,0.11.4)
  • L
NULL Pointer Dereference

[,0.11.4)
  • H
Uncontrolled Search Path Element

[,0.11.4)
  • L
Missing Release of Memory after Effective Lifetime

[0.6.0,0.11.3)
  • M
NULL Pointer Dereference

[0,0.11.3)
  • M
Out-of-bounds Read

[,0.11.2)
  • M
Integer Overflow or Wraparound

[0.11.0,0.11.2)
  • L
Double Free

[0.10.0,0.11.2)
  • L
Use of a Broken or Risky Cryptographic Algorithm

[,0.11.2)
  • L
Use After Free

[,0.11.2)
  • L
Out-of-bounds Write

[,0.11.2)
  • L
Return of Wrong Status Code

[,0.11.2)
  • L
Improper Neutralization of Special Elements used in a Command ('Command Injection')

[,0.9.8)[0.10.0,0.10.6)
  • L
Unchecked Return Value

[,0.9.8)[0.10.0,0.10.6)
  • M
Authentication Bypass by Capture-replay

[,0.9.8)
  • L
Denial of Service (DoS)

[,0.11.1)
  • M
Access Restriction Bypass

[0.9.0,0.9.7)[0.10.0,0.10.5)
  • M
NULL Pointer Dereference

[0.9.1,0.9.7)[0.10.0,0.10.5)
  • L
Cryptographic Issues

[,0.6.3)
  • M
Resource Management Errors

[,0.5.4)
  • M
Resource Management Errors

[,0.5.3)
  • M
Information Exposure

[,0.7.4)
  • H
Resource Management Errors

[,0.5.3)
  • M
Out-of-Bounds

[,0.9.6)
  • M
Denial of Service (DoS)

[,0.6.4)
  • H
Denial of Service (DoS)

[,0.5.3)
  • M
NULL Pointer Dereference

[,0.10.0)
  • H
Denial of Service (DoS)

[,0.7.2)
  • M
Denial of Service (DoS)

[,0.5.3)
  • H
Out-of-Bounds

[,0.5.3)
  • C
Improper Authentication

[0.6.0,0.7.6)[0.8.0,0.8.4)
  • H
Command Injection

[,0.8.8)[0.9.0,0.9.3)
  • M
NULL Pointer Dereference

[,0.8.9)[0.9.0,0.9.4)