Lucene search

K

23 matches found

CVE
CVE
added 2024/03/25 3:15 p.m.3903 views

CVE-2024-30203

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

5.5CVSS6.3AI score0.00027EPSS
CVE
CVE
added 2023/02/20 11:15 p.m.327 views

CVE-2022-48339

An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacte...

7.8CVSS8.4AI score0.00085EPSS
CVE
CVE
added 2017/09/14 4:29 p.m.225 views

CVE-2017-14482

GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gn...

8.8CVSS8.9AI score0.05053EPSS
CVE
CVE
added 2022/11/28 6:15 a.m.172 views

CVE-2022-45939

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags ...

7.8CVSS7.8AI score0.00037EPSS
CVE
CVE
added 2023/05/17 10:15 p.m.135 views

CVE-2023-2491

A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise L...

7.8CVSS7.8AI score0.00063EPSS
CVE
CVE
added 2024/03/25 3:15 p.m.131 views

CVE-2024-30204

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.

2.8CVSS6.4AI score0.00017EPSS
CVE
CVE
added 2023/02/20 11:15 p.m.127 views

CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the eta...

9.8CVSS9.5AI score0.00281EPSS
CVE
CVE
added 2024/03/25 3:15 p.m.118 views

CVE-2024-30205

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.

7.1CVSS6.3AI score0.0003EPSS
CVE
CVE
added 2024/06/23 10:15 p.m.97 views

CVE-2024-39331

In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.

9.8CVSS6.9AI score0.00903EPSS
CVE
CVE
added 2024/11/27 3:15 p.m.88 views

CVE-2024-53920

In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses t...

7.8CVSS8.8AI score0.00098EPSS
CVE
CVE
added 2023/02/20 11:15 p.m.86 views

CVE-2022-48338

An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through ...

7.3CVSS7.2AI score0.00119EPSS
CVE
CVE
added 2023/03/09 6:15 a.m.86 views

CVE-2023-27986

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.

7.8CVSS7.3AI score0.00065EPSS
CVE
CVE
added 2024/03/25 3:15 p.m.85 views

CVE-2024-30202

In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.

7.8CVSS6.7AI score0.00039EPSS
CVE
CVE
added 2023/03/09 6:15 a.m.83 views

CVE-2023-27985

emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90

7.8CVSS7.3AI score0.00056EPSS
CVE
CVE
added 2014/05/08 10:55 a.m.70 views

CVE-2014-3422

lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.

3.3CVSS6AI score0.00145EPSS
CVE
CVE
added 2014/05/08 10:55 a.m.66 views

CVE-2014-3421

lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.

3.3CVSS6AI score0.00145EPSS
CVE
CVE
added 2014/05/08 10:55 a.m.62 views

CVE-2014-3423

lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.

3.3CVSS6AI score0.00138EPSS
CVE
CVE
added 2017/10/31 8:29 p.m.61 views

CVE-2017-1000383

GNU Emacs version 25.3.1 (and other versions most likely) ignores umask when creating a backup save file ("[ORIGINAL_FILENAME]~") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the emacs binary.

5.5CVSS5.2AI score0.00142EPSS
CVE
CVE
added 2005/02/08 5:0 a.m.53 views

CVE-2005-0100

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

7.5CVSS7.2AI score0.02845EPSS
CVE
CVE
added 2007/11/02 10:46 p.m.52 views

CVE-2007-5795

The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a L...

6.3CVSS9.2AI score0.01447EPSS
CVE
CVE
added 2007/12/07 11:46 a.m.50 views

CVE-2007-6109

Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval...

10CVSS9.7AI score0.03126EPSS
CVE
CVE
added 2012/01/19 3:55 p.m.50 views

CVE-2012-0035

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

9.3CVSS6.2AI score0.0403EPSS
CVE
CVE
added 2014/05/08 10:55 a.m.50 views

CVE-2014-3424

lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.

3.3CVSS6AI score0.00145EPSS