Search for packages
| purl | pkg:nuget/libssh2-vc141_xp@1.2.8 |
| Tags | Ghost |
| Next non-vulnerable version | None. |
| Latest non-vulnerable version | None. |
| Risk | 4.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-mevw-g6yq-eqa8
Aliases: CVE-2019-3857 |
Out-of-bounds Write An integer overflow flaw which could lead to an out-of-bounds write was discovered in libssh2 in the way SSH_MSG_CHANNEL_REQUEST packets with an exit signal are parsed. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. |
Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T12:48:22.067162+00:00 | GitLab Importer | Affected by | VCID-mevw-g6yq-eqa8 | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/nuget/libssh2-vc141_xp/CVE-2019-3857.yml | 38.0.0 |