Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Rxvt
(Rxvt)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 7 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2008-04-07 | CVE-2008-1142 | rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine. | Aterm, Eterm, Mrxvt, Multi\-Aterm, Rxvt, Rxvt\-Unicode, Wterm | N/A | ||
2003-03-03 | CVE-2003-0066 | The rxvt terminal emulator 2.7.8 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. | Rxvt | N/A | ||
2003-03-03 | CVE-2003-0023 | The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu. | Rxvt | N/A | ||
2003-03-03 | CVE-2003-0022 | The "screen dump" feature in rxvt 2.7.8 allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. | Rxvt | N/A | ||
2001-06-15 | CVE-2001-1077 | Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument. | Rxvt | N/A | ||
2000-06-01 | CVE-2000-0476 | xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized. | Eterm, Putty, Rxvt, X11r6 | N/A | ||
1996-01-02 | CVE-1999-1186 | rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. | Linux, Rxvt, Slackware_linux | N/A |