Логотип exploitDog
bind:CVE-2024-38396
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-38396

Количество 2

Количество 2

nvd логотип

CVE-2024-38396

больше 1 года назад

An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-75hq-pffg-m782

больше 1 года назад

An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-38396

An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.

CVSS3: 9.8
10%
Средний
больше 1 года назад
github логотип
GHSA-75hq-pffg-m782

An issue was discovered in iTerm2 3.5.x before 3.5.2. Unfiltered use of an escape sequence to report a window title, in combination with the built-in tmux integration feature (enabled by default), allows an attacker to inject arbitrary code into the terminal, a different vulnerability than CVE-2024-38395.

CVSS3: 9.8
10%
Средний
больше 1 года назад

Уязвимостей на страницу