<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://wiki.x2go.org/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://wiki.x2go.org/feed.php">
        <title>X2Go - everywhere@home wiki:security</title>
        <description></description>
        <link>https://wiki.x2go.org/</link>
        <image rdf:resource="https://wiki.x2go.org/lib/tpl/x2go/images/favicon.ico" />
       <dc:date>2026-04-13T11:34:56+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://wiki.x2go.org/doku.php/wiki:security:rbash?rev=1415020037&amp;do=diff"/>
                <rdf:li rdf:resource="https://wiki.x2go.org/doku.php/wiki:security:start?rev=1389176417&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://wiki.x2go.org/lib/tpl/x2go/images/favicon.ico">
        <title>X2Go - everywhere@home</title>
        <link>https://wiki.x2go.org/</link>
        <url>https://wiki.x2go.org/lib/tpl/x2go/images/favicon.ico</url>
    </image>
    <item rdf:about="https://wiki.x2go.org/doku.php/wiki:security:rbash?rev=1415020037&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-11-03T13:07:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:security:rbash</title>
        <link>https://wiki.x2go.org/doku.php/wiki:security:rbash?rev=1415020037&amp;do=diff</link>
        <description>The way x2go works, allows every user to get ssh access to the x2go server.

This can be a big problem when, you can not use the broker, to prevent certain actions on
the x2go-server.

The users can browse the x2go-server and have the access to nearly all directiores.</description>
    </item>
    <item rdf:about="https://wiki.x2go.org/doku.php/wiki:security:start?rev=1389176417&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2014-01-08T10:20:17+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wiki:security:start</title>
        <link>https://wiki.x2go.org/doku.php/wiki:security:start?rev=1389176417&amp;do=diff</link>
        <description>Thoughts on Security

Session Database Backends

PostgreSQL

	*  In X2Go Server versions prior to 4.0.1.12 (or 4.0.0.10 for the Baikal LTS release branch), there used to be a root exploit that got reported and fixed around X-mas 2013.

SQLite

	*  In X2Go Server versions prior to 4.0.1.12 (or 4.0.0.10 for the Baikal LTS release branch), there used to be a</description>
    </item>
</rdf:RDF>
