CVE-2022-28054
https://notcve.org/view.php?id=CVE-2022-28054
Improper sanitization of trigger action scripts in VanDyke Software VShell for Windows v4.6.2 allows attackers to execute arbitrary code via a crafted value. Un saneo inapropiado de los scripts de acción de desencadenado en VanDyke Software VShell para Windows versión v4.6.2, permite a atacantes ejecutar código arbitrario por medio de un valor diseñado • https://www.vandyke.com/support/advisory/2022/02/remote-execution-via-triggers.html •
CVE-2007-6031
https://notcve.org/view.php?id=CVE-2007-6031
Unspecified vulnerability in VanDyke VShell 3.0.1 allows remote attackers to cause a denial of service via unspecified vectors. NOTE: this information is based upon a vague advisory by a vulnerability information sales organization that does not coordinate with vendors or release actionable advisories. A CVE has been assigned for tracking purposes, but duplicates with other CVEs are difficult to determine. Vulnerabilidad no especificada en VanDyke VShell 3.0.1 permite a atacantes remotos provocar una denegación de servicio mediante vectores no especificados. NOTA: Esta información se basa en una vaga descripción de una organización de venta de información de vulnerabilidades que no se coordina con los fabricantes o con los comunicados de correcciones de versiones. Se le asigna un CVE por cuestiones de seguimiento, pero es complicado determinar duplicidad con otros CVEs. • http://osvdb.org/45289 http://wslabi.com/wabisabilabi/showBidInfo.do?code=ZD-00000146 http://www.securityfocus.com/bid/26602 •
CVE-2001-0155
https://notcve.org/view.php?id=CVE-2001-0155
Format string vulnerability in VShell SSH gateway 1.0.1 and earlier allows remote attackers to execute arbitrary commands via a user name that contains format string specifiers. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.vandyke.com/products/vshell/security102.html •
CVE-2001-0156
https://notcve.org/view.php?id=CVE-2001-0156
VShell SSH gateway 1.0.1 and earlier has a default port forwarding rule of 0.0.0.0/0.0.0.0, which could allow local users to conduct arbitrary port forwarding to other systems. • http://www.atstake.com/research/advisories/2001/a021601-1.txt http://www.securityfocus.com/bid/2402 http://www.vandyke.com/products/vshell/security102.html https://exchange.xforce.ibmcloud.com/vulnerabilities/6148 •