CVE-2012-3478
https://notcve.org/view.php?id=CVE-2012-3478
rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line. rssh v2.3.3 y anteriores permite evitar las restricciones de acceso a objetos shell a usuarios locales a través de variables de entorno modificadas en la línea de comandos. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html http://secunia.com/advisories/50272 http://sourceforge.net/mailarchive/message.php?msg_id=29235647 http://www.debian.org/security/2012/dsa-2530 http://www.openwall.com/lists/oss-security/2012/08/10/7 http://www.openwall.com/lists/oss-security/2012/08/11/3 http://www.openwall.com/lists/oss-security/2012/11/28/3 http://www.securityfocus • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2004-1628
https://notcve.org/view.php?id=CVE-2004-1628
Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. • http://marc.info/?l=bugtraq&m=109855982425122&w=2 http://secunia.com/advisories/12954 http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml http://www.pizzashack.org/rssh https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 • CWE-134: Use of Externally-Controlled Format String •