Known Vulnerabilities in iTerm2