11 results (0.007 seconds)

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 0

09 Dec 2022 — The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set. El paquete rxvt-unicode es vulnerable a la ejecución remota de código, en la extensión en segundo plano de Perl, cuando un atacante puede controlar los datos escritos en el terminal del usuario y se configuran ciertas opciones. A vulnerability has been discovered in rxvt-unicode where data written to the termina... • https://bugzilla.redhat.com/show_bug.cgi?id=2151597 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.8EPSS: 0%CPEs: 7EXPL: 2

20 May 2021 — rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline. rxvt-unicode versión 9.22, rxvt versión 2.7.10, mrxvt versión 0.5.4 y Eterm versión 0.9.7 permiten una ejecución de código (potencialmente remoto) debido al manejo inapropiado de determinadas secuencias de escape (ESC GQ). Una respuesta es terminada con una nueva línea A vulnerability has been di... • http://cvs.schmorp.de/rxvt-unicode/Changes?view=log • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

02 May 2017 — Rxvt 2.7.10 is vulnerable to a denial of service attack by passing the value -2^31 inside a terminal escape code, which results in a non-invertible integer that eventually leads to a segfault due to an out of bounds read. Rxvt v2.7.10 es vulnerable a un ataque de denegación de servicio al pasar el valor -2^31 dentro de un código de escape de terminal, lo que resulta en un entero no invertible que eventualmente produce un segfault debido a una lectura fuera de límites. • http://www.openwall.com/lists/oss-security/2017/05/01/15 • CWE-125: Out-of-bounds Read •

CVSS: 9.1EPSS: 0%CPEs: 118EXPL: 0

07 Apr 2008 — rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine. Rxvt versión 2.6.4 abre una ventana terminal en :0 si no se establece la variable de entorno DISPLAY, lo que podría permitir a los usuarios locales secuestrar conexion... • http://article.gmane.org/gmane.comp.security.oss.general/122 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

09 Jan 2006 — rxvt-unicode before 6.3, on certain platforms that use openpty and non-Unix pty devices such as Linux and most BSD platforms, does not maintain the intended permissions of tty devices, which allows local users to gain read and write access to the devices. • http://dist.schmorp.de/rxvt-unicode/Changes •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

03 Mar 2003 — The "screen dump" feature in rxvt 2.7.8 allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. La característica "volcado de pantalla" en rxvt 2.7.8 permite a atacantes sobreescribir ficheros arbitrarios mediante una cierta secuencia de escape de caracteres cuando se hace eco en el terminal de un usuario, por ejemplo cuando el usuario ve un fichero conteniendo la secuenci... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html •

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 0

03 Mar 2003 — The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu. La característica "menuBar" en rxvt 2.7.8 permite a atacantes modificar opciones de menú y ejecutar comandos arbitrarios mediante una cierta secuencia de caracteres de escape que inserta comandos en el menú. • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html •

CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 0

03 Mar 2003 — The rxvt terminal emulator 2.7.8 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. El emulador de terminal rxvt 2.7.8 permite a atacantes modificar el título de la ventana mediante cierta secuencia de carácter de escape, y a continuación volver a insertarlo en la línea... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

15 Jun 2001 — Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument. • https://www.exploit-db.com/exploits/20928 •

CVSS: 7.5EPSS: 7%CPEs: 5EXPL: 2

01 Jun 2000 — xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized. • https://www.exploit-db.com/exploits/19984 •