Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
eterm eterm vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-1692
Eterm 0.9.4 opens a terminal window on :0 if -display is not specified and the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
Eterm Eterm 0.9.4
NA
CVE-2003-0021
The "screen dump" feature in Eterm 0.9.1 and previous versions allows malicious users to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence.
Michael Jennings Eterm 0.8.10
Michael Jennings Eterm 0.9.1
NA
CVE-2003-0068
The Eterm terminal emulator 0.9.1 and previous versions allows malicious users to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequ...
Michael Jennings Eterm 0.9.1
Michael Jennings Eterm 0.8.10
NA
CVE-2003-0382
Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable.
Michael Jennings Eterm 0.9.2
Michael Jennings Eterm 0.9.1
Debian Debian Linux 2.3
Debian Debian Linux 3.0
NA
CVE-2000-0367
Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an malicious user to gain root privileges.
Michael Jennings Eterm 0.8.8
8.8
CVSSv3
CVE-2021-33477
rxvt-unicode 9.22, rxvt 2.7.10, mrxvt 0.5.4, and Eterm 0.9.7 allow (potentially remote) code execution because of improper handling of certain escape sequences (ESC G Q). A response is terminated by a newline.
Eterm Project Eterm 0.9.7
Mrxvt Project Mrxvt 0.5.4
Rxvt Project Rxvt 2.7.10
Rxvt-unicode Project Rxvt-unicode 9.22
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Debian Debian Linux 9.0
NA
CVE-2000-0476
xterm, Eterm, and rxvt allow an malicious user to cause a denial of service by embedding certain escape characters which force the window to be resized.
Putty Putty 0.48
Xfree86 Project X11r6 3.3.3
Xfree86 Project X11r6 4.0
Michael Jennings Eterm 0.8.10
Rxvt Rxvt 2.6.1
1 EDB exploit
NA
CVE-2002-0143
Buffer overflow in Eterm of Enlightenment Imlib2 1.0.4 and previous versions allows local users to execute arbitrary code via a long HOME environment variable.
Enlightenment Imlib 2.0.01.0.0
Enlightenment Imlib 2.1.0.1
Enlightenment Imlib 2.1.0.2
Enlightenment Imlib 2.1.0.3
Enlightenment Imlib 2.1.0.4
Michael Jennings Eterm 0.9.1
1 EDB exploit
NA
CVE-2008-1142
rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections. NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected. NOTE: realistic attack scenario...
Aterm Aterm 1.00
Eterm Eterm 0.9.2
Mrxvt Mrxvt 0.4.2
Mrxvt Mrxvt
Eterm Eterm
Rxvt Rxvt 2.7.8
Rxvt Rxvt
Rxvt-unicode Rxvt-unicode
Rxvt-unicode Rxvt-unicode 9.0
Rxvt-unicode Rxvt-unicode 7.8
Rxvt-unicode Rxvt-unicode 7.7
Rxvt-unicode Rxvt-unicode 7.6
Rxvt-unicode Rxvt-unicode 7.5
Rxvt-unicode Rxvt-unicode 5.5
Rxvt-unicode Rxvt-unicode 5.4
Rxvt-unicode Rxvt-unicode 5.3
Rxvt-unicode Rxvt-unicode 5.2
Rxvt-unicode Rxvt-unicode 3.8
Rxvt-unicode Rxvt-unicode 3.7
Rxvt-unicode Rxvt-unicode 3.6
Rxvt-unicode Rxvt-unicode 3.5
Rxvt-unicode Rxvt-unicode 2.2
NA
CVE-2006-0224
Buffer overflow in Library of Assorted Spiffy Things (LibAST) 0.6.1 and previous versions, as used in Eterm and possibly other software, allows local users to execute arbitrary code as the utmp user via a long -X command line argument (alternative configuration file name).
Libast Libast 0.5
Libast Libast 0.6
Libast Libast 0.4
Libast Libast 0.6.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
cross-site request forgery
CVE-2024-34351
CVE-2024-1076
CVE-2024-25522
CVE-2024-34547
CVE-2024-4644
unauthorized
remote
CVE-2024-4671
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started