5 results (0.006 seconds)

CVSS: 9.8EPSS: 94%CPEs: 444EXPL: 19

10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.9EPSS: 0%CPEs: 16EXPL: 0

23 Mar 2011 — The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities. La configuración por defecto de Terminal en Apple Mac OS X v10.6 antes de v10.6.7 utiliza el protocolo SSH versión 1 dentro del cuadro de diálogo Nueva Conexión Remota, lo que podría hacer más fácil para los atacantes "man-in-the-middle" falsificar... • http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html • CWE-16: Configuration •

CVSS: 9.8EPSS: 0%CPEs: 21EXPL: 1

04 May 2005 — Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVSS: 9.8EPSS: 17%CPEs: 11EXPL: 1

04 May 2005 — The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote attackers to execute arbitrary commands. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVSS: 9.8EPSS: 3%CPEs: 2EXPL: 2

31 Dec 2002 — Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window. • https://www.exploit-db.com/exploits/21815 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •