3 results (0.009 seconds)

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value. Un saneo inapropiado de los scripts de acción de desencadenado en VanDyke Software VShell para Windows versión v4.6.2, permite a atacantes ejecutar código arbitrario por medio de un valor diseñado • https://www.vandyke.com/support/advisory/2022/02/remote-execution-via-triggers.html •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in VShell SSH gateway 1.0.1 and earlier allows remote attackers to execute arbitrary commands via a user name that contains format string specifiers. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.vandyke.com/products/vshell/security102.html •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.securityfocus.com/bid/2402 http://www.vandyke.com/products/vshell/security102.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 •