Page 2 of 7 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

The xterm terminal emulator in XFree86 4.2.0 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal xterm en XFree86 4.2.0 permite a atacantes modificar el título de la ventana mediante cierta secuencia de caracter de escape y a continuación insertarlo de vuelta en la linea de comando en el terminal del usuario, por ejemplo, cuando el usuario ve un fichero que contiene la secuencia maliciosa, lo que podría permitir ejecutar comandos arbitrarios. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html http://marc.info/?l=bugtraq&m=104612710031920&w=2 http://www.debian.org/security/2003/dsa-380 http://www.iss.net/security_center/static/11414.php http://www.openwall.com/lists/oss-security/2024/06/15/1 http://www.redhat.com/support/errata/RHSA-2003-064.html http://www.redhat.com/support/errata/RHSA-2003-065.html http://www.redhat.com/support/errata/RHSA-2003-066.html http://www.redhat.com&# •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in fbglyph.c in XFree86 before 4.2.0, related to glyph clipping for large origins, allows attackers to cause a denial of service and possibly gain privileges via a large number of characters, possibly through the web page search form of KDE Konqueror or from an xterm command with a long title. • http://cvsweb.xfree86.org/cvsweb/xc/programs/Xserver/fb/fbglyph.c http://marc.info/?l=bugtraq&m=100776624224549&w=2 http://marc.info/?l=bugtraq&m=100784290015880&w=2 http://marc.info/?l=vuln-dev&m=100118958310463&w=2 http://www.securityfocus.com/bid/3657 http://www.securityfocus.com/bid/3663 http://www.xfree86.org/4.2.0/RELNOTES2.html#2 http://www.xfree86.org/security https://exchange.xforce.ibmcloud.com/vulnerabilities/7673 https://exchange.xforce.ibmcloud. •