CVE-2023-40359
- EPSS 0.12%
- Veröffentlicht 14.08.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:19:17
xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at co...
CVE-2022-45063
- EPSS 3.65%
- Veröffentlicht 10.11.2022 16:15:12
- Zuletzt bearbeitet 21.11.2024 07:28:42
xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations o...
CVE-2022-24130
- EPSS 0.13%
- Veröffentlicht 31.01.2022 05:15:08
- Zuletzt bearbeitet 21.11.2024 06:49:52
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
CVE-2021-27135
- EPSS 0.87%
- Veröffentlicht 10.02.2021 16:15:13
- Zuletzt bearbeitet 21.11.2024 05:57:23
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
CVE-2006-7236
- EPSS 4.35%
- Veröffentlicht 02.01.2009 18:11:09
- Zuletzt bearbeitet 09.04.2025 00:30:58
The default configuration of xterm on Debian GNU/Linux sid and possibly Ubuntu enables the allowWindowOps resource, which allows user-assisted attackers to execute arbitrary code or have unspecified other impact via escape sequences.
CVE-2008-2383
- EPSS 1.72%
- Veröffentlicht 02.01.2009 18:11:09
- Zuletzt bearbeitet 09.04.2025 00:30:58
CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related...