Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

iTerm2 — Vulnerabilities & Security Advisories 3

Browse all 3 CVE security advisories affecting iTerm2. AI-powered Chinese analysis, POCs, and references for each vulnerability.

iTerm2 serves as a terminal emulator for macOS, primarily used for command-line interface access and shell integration. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure handling of external data. While no major security incidents have been widely documented, the three CVEs on record highlight potential risks in its rendering engine and protocol handling. The application's extensive feature set, including scripting capabilities and session management, introduces multiple attack surfaces that require careful configuration to mitigate potential exploitation risks.

Top products by iTerm2: iTerm2

This page lists every published CVE security advisory associated with iTerm2. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.