Filtered by vendor Invisible-island Subscriptions
Filtered by product Xterm Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-40359 1 Invisible-island 1 Xterm 2024-11-21 9.8 Critical
xterm before 380 supports ReGIS reporting for character-set names even if they have unexpected characters (i.e., neither alphanumeric nor underscore), aka a pointer/overflow issue. This can only occur for xterm installations that are configured at compile time to use a certain experimental feature.
CVE-2022-45063 2 Fedoraproject, Invisible-island 2 Fedora, Xterm 2024-11-21 9.8 Critical
xterm before 375 allows code execution via font ops, e.g., because an OSC 50 response may have Ctrl-g and therefore lead to command execution within the vi line-editing mode of Zsh. NOTE: font ops are not allowed in the xterm default configurations of some Linux distributions.
CVE-2022-24130 3 Debian, Fedoraproject, Invisible-island 3 Debian Linux, Fedora, Xterm 2024-11-21 5.5 Medium
xterm through Patch 370, when Sixel support is enabled, allows attackers to trigger a buffer overflow in set_sixel in graphics_sixel.c via crafted text.
CVE-2021-27135 4 Debian, Fedoraproject, Invisible-island and 1 more 5 Debian Linux, Fedora, Xterm and 2 more 2024-11-21 9.8 Critical
xterm before Patch #366 allows remote attackers to execute arbitrary code or cause a denial of service (segmentation fault) via a crafted UTF-8 combining character sequence.
CVE-2008-2383 2 Invisible-island, Redhat 2 Xterm, Enterprise Linux 2024-11-21 N/A
CRLF injection vulnerability in xterm allows user-assisted attackers to execute arbitrary commands via LF (aka \n) characters surrounding a command name within a Device Control Request Status String (DECRQSS) escape sequence in a text file, a related issue to CVE-2003-0063 and CVE-2003-0071.
CVE-2006-7236 3 Debian, Invisible-island, Ubuntu 3 Debian Linux, Xterm, Linux 2024-11-21 N/A
The default configuration of xterm on Debian GNU/Linux sid and possibly Ubuntu enables the allowWindowOps resource, which allows user-assisted attackers to execute arbitrary code or have unspecified other impact via escape sequences.