
CVE-2023-48795 – ssh: Prefix truncation attack on Binary Packet Protocol (BPP)
https://notcve.org/view.php?id=CVE-2023-48795
18 Dec 2023 — The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phas... • https://packetstorm.news/files/id/176280 • CWE-222: Truncation of Security-relevant Information CWE-354: Improper Validation of Integrity Check Value •

CVE-2022-28054
https://notcve.org/view.php?id=CVE-2022-28054
02 May 2022 — Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value. Un saneo inapropiado de los scripts de acción de desencadenado en VanDyke Software VShell para Windows versión v4.6.2, permite a atacantes ejecutar código arbitrario por medio de un valor diseñado • https://www.vandyke.com/support/advisory/2022/02/remote-execution-via-triggers.html •

CVE-2020-12651 – SecureCRT Memory Corruption
https://notcve.org/view.php?id=CVE-2020-12651
15 May 2020 — SecureCRT before 8.7.2 allows remote attackers to execute arbitrary code via an Integer Overflow and a Buffer Overflow because a banner can trigger a line number to CSI functions that exceeds INT_MAX. SecureCRT versiones anteriores a 8.7.2, permite a atacantes remotos ejecutar código arbitrario por medio de un Desbordamiento de Enteros y un desbordamiento del búfer porque una bandera puede activar un número de línea en las funciones CSI que exceden a INT_MAX. SecureCRT suffers from a memory corruption vulne... • https://packetstorm.news/files/id/157718 • CWE-190: Integer Overflow or Wraparound •

CVE-2011-5164 – AbsoluteFTP 1.9.6 < 2.2.10 - 'LIST' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2011-5164
15 Sep 2012 — Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response. Desbordamiento de búfer basado en pila en VanDyke Software AbsoluteFTP v1.9.6 hasta v2.2.10 permite a servidores remotos FTP ejecutar código arbitrario a través del nombre de un fichero en la respuesta de un comando LIST. • https://www.exploit-db.com/exploits/18102 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •