Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eterm eterm vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2021-33477
rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
Eterm Project Eterm 0.9.7
Mrxvt Project Mrxvt 0.5.4
Rxvt Project Rxvt 2.7.10
Rxvt-unicode Project Rxvt-unicode 9.22
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
NA
CVE-2008-1692
Eterm 0.9.4 opens a terminal window on :0 if -display is not specified and the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
Eterm Eterm 0.9.4
NA
CVE-2008-1142
rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. NOTE: realistic attack scenario...
Rxvt-unicode Rxvt-unicode 2.5
Aterm Aterm 0.3.1
Rxvt Rxvt 2.7.5
Rxvt-unicode Rxvt-unicode
Multi-aterm Multi-aterm 0.0.5
Aterm Aterm 1.00
Rxvt-unicode Rxvt-unicode 1.3
Rxvt-unicode Rxvt-unicode 3.4
Rxvt-unicode Rxvt-unicode 5.1
Rxvt-unicode Rxvt-unicode 7.2
Rxvt-unicode Rxvt-unicode 2.3
Rxvt-unicode Rxvt-unicode 3.1
Rxvt-unicode Rxvt-unicode 1.8
Rxvt-unicode Rxvt-unicode 5.0
Rxvt-unicode Rxvt-unicode 3.9
Rxvt-unicode Rxvt-unicode 4.0
Rxvt-unicode Rxvt-unicode 7.1
Rxvt-unicode Rxvt-unicode 5.5
Rxvt-unicode Rxvt-unicode 6.2
Rxvt Rxvt
Multi-aterm Multi-aterm 0.0.1
Rxvt Rxvt 2.6.4
NA
CVE-2006-0224
Buffer overflow in Library of Assorted Spiffy Things (LibAST) 0.6.1 and previous versions, as used in Eterm and possibly other software, allows local users to execute arbitrary code as the utmp user via a long -X command line argument (alternative configuration file name).
Libast Libast 0.5
Libast Libast 0.4
Libast Libast 0.6.1
Libast Libast 0.6
NA
CVE-2003-0382
Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable.
Michael Jennings Eterm 0.9.2
Michael Jennings Eterm 0.9.1
Debian Debian Linux 2.3
Debian Debian Linux 3.0
NA
CVE-2003-0021
The "screen dump" feature in Eterm 0.9.1 and previous versions allows malicious users to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence.
Michael Jennings Eterm 0.9.1
Michael Jennings Eterm 0.8.10
NA
CVE-2003-0068
The Eterm terminal emulator 0.9.1 and previous versions allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequ...
Michael Jennings Eterm 0.9.1
Michael Jennings Eterm 0.8.10
NA
CVE-2002-0143
Buffer overflow in Eterm of Enlightenment Imlib2 1.0.4 and previous versions allows local users to execute arbitrary code via a long HOME environment variable.
Enlightenment Imlib 2.1.0.1
Enlightenment Imlib 2.1.0.2
Enlightenment Imlib 2.0.01.0.0
Enlightenment Imlib 2.1.0.4
Enlightenment Imlib 2.1.0.3
Michael Jennings Eterm 0.9.1
1 EDB exploit
NA
CVE-2000-0476
xterm, Eterm, and rxvt allow an malicious user to cause a denial of service by embedding certain escape characters which force the window to be resized.
Rxvt Rxvt 2.6.1
Xfree86 Project X11r6 4.0
Xfree86 Project X11r6 3.3.3
Putty Putty 0.48
Michael Jennings Eterm 0.8.10
1 EDB exploit
NA
CVE-2000-0367
Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an malicious user to gain root privileges.
Michael Jennings Eterm 0.8.8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29824
CVE-2024-30095
CVE-2024-30104
client side
CVE-2024-5840
CVE-2024-34405
unprivileged
wireless
CVE-2024-4577
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started