Terminal
by Apple Inc.
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2002-1898 | 0.03 | — | 0.06 | Dec 31, 2002 | Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window. | ||
| CVE-2005-1342 | 0.01 | — | 0.18 | May 4, 2005 | The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote attackers to execute arbitrary commands. | ||
| CVE-2011-0189 | 0.00 | — | 0.00 | Mar 23, 2011 | The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities. | ||
| CVE-2005-1341 | 0.00 | — | 0.01 | May 4, 2005 | Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. |
- CVE-2002-1898Dec 31, 2002risk 0.03cvss —epss 0.06
Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window.
- CVE-2005-1342May 4, 2005risk 0.01cvss —epss 0.18
The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote attackers to execute arbitrary commands.
- CVE-2011-0189Mar 23, 2011risk 0.00cvss —epss 0.00
The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.
- CVE-2005-1341May 4, 2005risk 0.00cvss —epss 0.01
Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences.