GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file
Reporter | Title | Published | Views | Family All 134 |
---|---|---|---|---|
![]() | CVE-2022-48337 | 21 Feb 202306:29 | โ | redhatcve |
![]() | Command Injection | 11 Mar 202319:20 | โ | veracode |
![]() | Input validation | 20 Feb 202323:15 | โ | prion |
![]() | CVE-2022-48337 | 20 Feb 202323:15 | โ | alpinelinux |
![]() | CVE-2022-48337 | 20 Feb 202323:15 | โ | debiancve |
![]() | CVE-2022-48337 affecting package emacs for versions less than 28.2-4 | 17 Mar 202317:25 | โ | cbl_mariner |
![]() | CVE-2022-48337 | 20 Feb 202323:15 | โ | osv |
![]() | RHSA-2023:7083 Red Hat Security Advisory: emacs security update | 16 Sep 202411:27 | โ | osv |
![]() | Moderate: emacs security update | 14 Nov 202300:00 | โ | osv |
![]() | RHSA-2024:1408 Red Hat Security Advisory: emacs security update | 16 Sep 202411:27 | โ | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo