Page 2 of 7 results (0.002 seconds)

CVSS: 2.1EPSS: 0%CPEs: 13EXPL: 0

rssh 2.3.3 and earlier allows local users to bypass intended restricted shell access via crafted environment variables in the command line. rssh v2.3.3 y anteriores permite evitar las restricciones de acceso a objetos shell a usuarios locales a través de variables de entorno modificadas en la línea de comandos. • http://archives.neohapsis.com/archives/bugtraq/2012-05/0036.html http://archives.neohapsis.com/archives/bugtraq/2012-11/0101.html http://secunia.com/advisories/50272 http://sourceforge.net/mailarchive/message.php?msg_id=29235647 http://www.debian.org/security/2012/dsa-2530 http://www.openwall.com/lists/oss-security/2012/08/10/7 http://www.openwall.com/lists/oss-security/2012/08/11/3 http://www.openwall.com/lists/oss-security/2012/11/28/3 http://www.securityfocus • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in log.c in rssh before 2.2.2 allows remote authenticated users to execute arbitrary code. • http://marc.info/?l=bugtraq&m=109855982425122&w=2 http://secunia.com/advisories/12954 http://www.gentoo.org/security/en/glsa/glsa-200410-28.xml http://www.pizzashack.org/rssh https://exchange.xforce.ibmcloud.com/vulnerabilities/17831 • CWE-134: Use of Externally-Controlled Format String •