
CVE-2025-22136 – Tabby has a TCC Bypass via Misconfigured Node Fuses
https://notcve.org/view.php?id=CVE-2025-22136
08 Jan 2025 — Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.217 , Tabby enables several high-risk Electron Fuses, including RunAsNode, EnableNodeCliInspectArguments, and EnableNodeOptionsEnvironmentVariable. These fuses create potential code injection vectors even though the application is signed with hardened runtime and lacks dangerous entitlements such as com.apple.security.cs.disable-library-validation and com.apple.security.cs.allow-dyld-environment-variables. This vulnerability ... • https://github.com/Eugeny/tabby/commit/93513541f7161fa8a59491603cabb6a101c0c08e • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-55950 – Tabby has a TCC Bypass via Unnecessary Permissive Entitlements in Tabby
https://notcve.org/view.php?id=CVE-2024-55950
26 Dec 2024 — Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.216, Tabby terminal emulator contains overly permissive entitlements that are unnecessary for its core functionality and plugin system, creating potential security vulnerabilities. The application currently holds powerful permissions including camera, microphone access, and the ability to access personal folders (Downloads, Documents, etc.) through Apple Events, while also maintaining dangerous entitlements that enable code i... • https://github.com/Eugeny/tabby/commit/e1e6e1cdab0310a881e36afd7c2744e5f905518b • CWE-276: Incorrect Default Permissions •

CVE-2021-24831 – Tab - Accordion, FAQ < 1.3.2 - Unauthenticated AJAX Calls
https://notcve.org/view.php?id=CVE-2021-24831
06 Dec 2021 — All AJAX actions of the Tab WordPress plugin before 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated attackers to modify various data in the plugin, such as add/edit/delete arbitrary tabs. Todas las acciones AJAX del plugin Tab de WordPress versiones anteriores a 1.3.2, están disponibles tanto para usuarios no autenticados como para los autenticados, permitiendo a atacantes no autenticados modificar varios datos en el plugin, como añadir/editar/borrar pestañas ar... • https://wpscan.com/vulnerability/75ed9f5f-e091-4372-a6cb-57958ad5f900 • CWE-425: Direct Request ('Forced Browsing') CWE-862: Missing Authorization •