Page 2 of 11 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

The "screen dump" feature in rxvt 2.7.8 allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. La característica "volcado de pantalla" en rxvt 2.7.8 permite a atacantes sobreescribir ficheros arbitrarios mediante una cierta secuencia de escape de caracteres cuando se hace eco en el terminal de un usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuencia maliciosa. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11413.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:034 http://www.redhat.com/support/errata/RHSA-2003-054.html http://www.redhat.com/support/errata/RHSA-2003-055.html http://www.securityfocus.com/bid/6938 https://access.redhat.com/security/cve/CVE-2003-0022 https://bugzilla.redhat.com/show_ •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu. La característica "menuBar" en rxvt 2.7.8 permite a atacantes modificar opciones de menú y ejecutar comandos arbitrarios mediante una cierta secuencia de caracteres de escape que inserta comandos en el menú. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11416.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:034 http://www.redhat.com/support/errata/RHSA-2003-054.html http://www.redhat.com/support/errata/RHSA-2003-055.html http://www.securityfocus.com/bid/6947 https://access.redhat.com/security/cve/CVE-2003-0023 https://bugzilla.redhat.com/show_ •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

The rxvt terminal emulator 2.7.8 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal rxvt 2.7.8 permite a atacantes modificar el título de la ventana mediante cierta secuencia de carácter de escape, y a continuación volver a insertarlo en la línea de comandos del terminal del usuario, lo que podría permitir al atacante ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.iss.net/security_center/static/11414.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:003 http://www.redhat.com/support/errata/RHSA-2003-054.html http://www.redhat.com/support/errata/RHSA-2003-055.html http://www.securityfocus.com/advisories/5137 http://www.securityfocus.com/bid/6953 https://access.redhat.com/security/cve/CVE- •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 2

Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument. • https://www.exploit-db.com/exploits/20928 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-028-01 http://www.debian.org/security/2001/dsa-062 http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-060.php http://www.securityfocus.com/archive/1/191510 http://www.securityfocus.com/bid/2878 https://exchange.xforce.ibmcloud.com/vulnerabilities/6701 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 2

xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized. • https://www.exploit-db.com/exploits/19984 http://archives.neohapsis.com/archives/bugtraq/2000-05/0409.html http://archives.neohapsis.com/archives/bugtraq/2000-05/0420.html http://www.openwall.com/lists/oss-security/2024/06/09/1 http://www.openwall.com/lists/oss-security/2024/06/09/2 http://www.securityfocus.com/bid/1298 •