Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-39qf-gxpw-7vqf

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

EPSS

Процентиль: 86%
0.02845
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

redhat
больше 20 лет назад

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

nvd
больше 20 лет назад

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

debian
больше 20 лет назад

Format string vulnerability in the movemail utility in (1) Emacs 20.x, ...

EPSS

Процентиль: 86%
0.02845
Низкий