Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Eterm
(Michael_jennings)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2000-06-01 | CVE-2000-0476 | xterm, Eterm, and rxvt allow an attacker to cause a denial of service by embedding certain escape characters which force the window to be resized. | Eterm, Putty, Rxvt, X11r6 | N/A | ||
2003-07-02 | CVE-2003-0382 | Buffer overflow in Eterm 0.9.2 allows local users to gain privileges via a long ETERMPATH environment variable. | Debian_linux, Eterm | N/A | ||
2003-03-03 | CVE-2003-0068 | The Eterm terminal emulator 0.9.1 and earlier allows attackers to modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. | Eterm | N/A | ||
2003-03-03 | CVE-2003-0021 | The "screen dump" feature in Eterm 0.9.1 and earlier allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence. | Eterm | N/A | ||
2002-03-25 | CVE-2002-0143 | Buffer overflow in Eterm of Enlightenment Imlib2 1.0.4 and earlier allows local users to execute arbitrary code via a long HOME environment variable. | Imlib, Eterm | N/A | ||
1999-02-18 | CVE-2000-0367 | Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an attacker to gain root privileges. | Eterm | N/A |