GNU Emacs 28.2 allows shell command execution via metacharacters in source-code file name
Reporter | Title | Published | Views | Family All 118 |
---|---|---|---|---|
Tenable Nessus | FreeBSD : emacs -- arbitary shell command execution vulnerability of ctags (76e2fcce-92d2-11ed-a635-080027f5fec9) | 13 Jan 202300:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 2.9.0 : emacs (EulerOS-SA-2023-1669) | 27 Apr 202300:00 | – | nessus |
Tenable Nessus | Oracle Linux 9 : emacs (ELSA-2023-2366) | 15 May 202300:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP11 : emacs (EulerOS-SA-2023-1582) | 24 Mar 202300:00 | – | nessus |
Tenable Nessus | SUSE SLES12 Security Update : emacs (SUSE-SU-2022:4305-1) | 2 Dec 202200:00 | – | nessus |
Tenable Nessus | Slackware Linux 15.0 / current emacs Vulnerability (SSA:2022-342-01) | 9 Dec 202200:00 | – | nessus |
Tenable Nessus | Debian DSA-5314-1 : emacs - security update | 12 Jan 202300:00 | – | nessus |
Tenable Nessus | AlmaLinux 8 : emacs (ALSA-2023:3042) | 20 May 202300:00 | – | nessus |
Tenable Nessus | Amazon Linux 2022 : (ALAS2022-2023-277) | 25 Jan 202300:00 | – | nessus |
Tenable Nessus | Amazon Linux 2 : (ALAS-2023-1928) | 6 Feb 202300:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 20.04 | noarch | emacs | any | UNKNOWN |
ubuntu | 22.04 | noarch | emacs | any | UNKNOWN |
ubuntu | 16.04 | noarch | emacs24 | 24.5+1-6ubuntu1.1+esm1 | UNKNOWN |
ubuntu | 18.04 | noarch | emacs25 | any | UNKNOWN |
ubuntu | 18.04 | noarch | xemacs21 | any | UNKNOWN |
ubuntu | 20.04 | noarch | xemacs21 | any | UNKNOWN |
ubuntu | 22.04 | noarch | xemacs21 | any | UNKNOWN |
ubuntu | 24.04 | noarch | xemacs21 | any | UNKNOWN |
ubuntu | 16.04 | noarch | xemacs21 | any | UNKNOWN |
ubuntu | 18.04 | noarch | xemacs21-packages | any | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo