
CVE-2023-44487 – HTTP/2 Rapid Reset Attack Vulnerability
https://notcve.org/view.php?id=CVE-2023-44487
10 Oct 2023 — The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. El protocolo HTTP/2 permite una denegación de servicio (consumo de recursos del servidor) porque la cancelación de solicitudes puede restablecer muchas transmisiones rápidamente, como se explotó en la naturaleza entre agosto y octubre de 2023. A flaw was found in handling multiplexed streams in the HTTP/2 protocol. ... • https://github.com/imabee101/CVE-2023-44487 • CWE-400: Uncontrolled Resource Consumption •

CVE-2011-0189
https://notcve.org/view.php?id=CVE-2011-0189
23 Mar 2011 — The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities. La configuración por defecto de Terminal en Apple Mac OS X v10.6 antes de v10.6.7 utiliza el protocolo SSH versión 1 dentro del cuadro de diálogo Nueva Conexión Remota, lo que podría hacer más fácil para los atacantes "man-in-the-middle" falsificar... • http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html • CWE-16: Configuration •

CVE-2005-1341
https://notcve.org/view.php?id=CVE-2005-1341
04 May 2005 — Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVE-2005-1342
https://notcve.org/view.php?id=CVE-2005-1342
04 May 2005 — The x-man-page: URI handler for Apple Terminal 1.4.4 in Mac OS X 10.3.9 does not cleanse terminal escape sequences, which allows remote attackers to execute arbitrary commands. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVE-2002-1898 – Apple Mac OSX 10.2 - Terminal.APP Telnet Link Command Execution
https://notcve.org/view.php?id=CVE-2002-1898
31 Dec 2002 — Terminal 1.3 in Apple Mac OS X 10.2 allows remote attackers to execute arbitrary commands via shell metacharacters in a telnet:// link, which is executed by Terminal.app window. • https://www.exploit-db.com/exploits/21815 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •