Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hw9p-49fv-hhp6

Опубликовано: 04 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

EPSS

Процентиль: 88%
0.0403
Низкий

Связанные уязвимости

ubuntu
около 14 лет назад

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

redhat
около 14 лет назад

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

nvd
около 14 лет назад

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.

debian
около 14 лет назад

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as u ...

EPSS

Процентиль: 88%
0.0403
Низкий