Rxvt

Rxvt

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 07.04.2008 17:44:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. ...

  • EPSS 0.76%
  • Veröffentlicht 03.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The "screen dump" feature in rxvt 2.7.8 allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence.

  • EPSS 0.54%
  • Veröffentlicht 03.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The menuBar feature in rxvt 2.7.8 allows attackers to modify menu options and execute arbitrary commands via a certain character escape sequence that inserts the commands into the menu.

  • EPSS 0.71%
  • Veröffentlicht 03.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The rxvt terminal emulator 2.7.8 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malici...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 15.06.2001 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in tt_printf function of rxvt 2.6.2 allows local users to gain privileges via a long (1) -T or (2) -name argument.

Exploit
  • EPSS 9.81%
  • Veröffentlicht 01.06.2000 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized.

  • EPSS 0.06%
  • Veröffentlicht 02.01.1996 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.