CVE-2022-28054
https://notcve.org/view.php?id=CVE-2022-28054
Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value. Un saneo inapropiado de los scripts de acción de desencadenado en VanDyke Software VShell para Windows versión v4.6.2, permite a atacantes ejecutar código arbitrario por medio de un valor diseñado • https://www.vandyke.com/support/advisory/2022/02/remote-execution-via-triggers.html •
CVE-2001-0155
https://notcve.org/view.php?id=CVE-2001-0155
Format string vulnerability in VShell SSH gateway 1.0.1 and earlier allows remote attackers to execute arbitrary commands via a user name that contains format string specifiers. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.vandyke.com/products/vshell/security102.html •
CVE-2001-0156
https://notcve.org/view.php?id=CVE-2001-0156
VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.securityfocus.com/bid/2402 http://www.vandyke.com/products/vshell/security102.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 •