Lucene search

K

Emacs Security Vulnerabilities - 2023

cve
cve

CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the eta...

9.8CVSS

9.5AI Score

0.003EPSS

2023-02-20 11:15 PM
99
cve
cve

CVE-2022-48338

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through ...

7.3CVSS

7.2AI Score

0.0004EPSS

2023-02-20 11:15 PM
65
cve
cve

CVE-2022-48339

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacte...

7.8CVSS

8.4AI Score

0.001EPSS

2023-02-20 11:15 PM
220
cve
cve

CVE-2023-2491

A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise L...

7.8CVSS

7.8AI Score

0.001EPSS

2023-05-17 10:15 PM
86
cve
cve

CVE-2023-27985

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90

7.8CVSS

7.3AI Score

0.001EPSS

2023-03-09 06:15 AM
60
2
cve
cve

CVE-2023-27986

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.

7.8CVSS

7.3AI Score

0.001EPSS

2023-03-09 06:15 AM
64
2