Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Terminal
(Apple)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2002-12-31 | CVE-2002-1898 | Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window. | Terminal | N/A | ||
2011-03-23 | CVE-2011-0189 | The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities. | Mac_os_x, Mac_os_x_server, Terminal | N/A | ||
2005-05-04 | CVE-2005-1342 | The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote attackers to execute arbitrary commands. | Mac_os_x, Terminal | N/A | ||
2005-05-04 | CVE-2005-1341 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. | Mac_os_x, Mac_os_x_server, Terminal | N/A |