Show filters
8 Total Results
Displaying 1-8 of 8
Sort by:
Attacker Value
Moderate
iTerm2 with tmux integration is vulnerable to remote command execution
Disclosure Date: October 09, 2019 (last updated November 08, 2023)
A vulnerability exists in the way that iTerm2 integrates with tmux's control mode, which may allow an attacker to execute arbitrary commands by providing malicious output to the terminal. This affects versions of iTerm2 up to and including 3.3.5. This vulnerability may allow an attacker to execute arbitrary commands on their victim's computer by providing malicious output to the terminal. It could be exploited using command-line utilities that print attacker-controlled content.
0
Attacker Value
Unknown
CVE-2023-46322
Disclosure Date: October 23, 2023 (last updated November 02, 2023)
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize ssh hostnames in URLs. The hostname's initial character may be non-alphanumeric. The hostname's other characters may be outside the set of alphanumeric characters, dash, and period.
0
Attacker Value
Unknown
CVE-2023-46321
Disclosure Date: October 23, 2023 (last updated November 02, 2023)
iTermSessionLauncher.m in iTerm2 before 3.5.0beta12 does not sanitize paths in x-man-page URLs. They may have shell metacharacters for a /usr/bin/man command line.
0
Attacker Value
Unknown
CVE-2023-46301
Disclosure Date: October 22, 2023 (last updated November 01, 2023)
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to upload.
0
Attacker Value
Unknown
CVE-2023-46300
Disclosure Date: October 22, 2023 (last updated November 01, 2023)
iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration.
0
Attacker Value
Unknown
CVE-2022-45872
Disclosure Date: November 23, 2022 (last updated October 08, 2023)
iTerm2 before 3.4.18 mishandles a DECRQSS response.
0
Attacker Value
Unknown
CVE-2019-19022
Disclosure Date: November 17, 2019 (last updated November 27, 2024)
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git repositories.
0
Attacker Value
Unknown
CVE-2015-9231
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
iTerm2 3.x before 3.1.1 allows remote attackers to discover passwords by reading DNS queries. A new (default) feature was added to iTerm2 version 3.0.0 (and unreleased 2.9.x versions such as 2.9.20150717) that resulted in a potential information disclosure. In an attempt to see whether the text under the cursor (or selected text) was a URL, the text would be sent as an unencrypted DNS query. This has the potential to result in passwords and other sensitive information being sent in cleartext without the user being aware.
0