Page 2 of 8 results (0.002 seconds)

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Buffer overflow in VanDyke SecureCRT before 3.4.2, when using the SSH-1 protocol, allows remote attackers to execute arbitrary code via a long (1) username or (2) password. • http://archives.neohapsis.com/archives/vuln-dev/2001-q4/0967.html http://www.kb.cert.org/vuls/id/216227 https://exchange.xforce.ibmcloud.com/vulnerabilities/10111 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Format string vulnerability in VShell SSH gateway 1.0.1 and earlier allows remote attackers to execute arbitrary commands via a user name that contains format string specifiers. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.vandyke.com/products/vshell/security102.html •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.securityfocus.com/bid/2402 http://www.vandyke.com/products/vshell/security102.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 •