Количество 13
Количество 13
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-48337
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell ...
GHSA-8hw9-jqh3-h2rx
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.
BDU:2024-06036
Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2023:0675-1
Security update for emacs
SUSE-SU-2023:0597-1
Security update for emacs
ELSA-2023-7083
ELSA-2023-7083: emacs security update (MODERATE)
SUSE-SU-2023:0598-1
Security update for emacs
ELSA-2023-2626
ELSA-2023-2626: emacs security update (IMPORTANT)
ROS-20240806-06
Множественные уязвимости emacs
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.3 | 0% Низкий | почти 3 года назад | |
CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
CVSS3: 9.8 | 0% Низкий | почти 3 года назад | ||
CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell ... | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
GHSA-8hw9-jqh3-h2rx GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
BDU:2024-06036 Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | почти 3 года назад | |
SUSE-SU-2023:0675-1 Security update for emacs | почти 3 года назад | |||
SUSE-SU-2023:0597-1 Security update for emacs | почти 3 года назад | |||
ELSA-2023-7083 ELSA-2023-7083: emacs security update (MODERATE) | около 2 лет назад | |||
SUSE-SU-2023:0598-1 Security update for emacs | почти 3 года назад | |||
ELSA-2023-2626 ELSA-2023-2626: emacs security update (IMPORTANT) | больше 2 лет назад | |||
ROS-20240806-06 Множественные уязвимости emacs | CVSS3: 9.8 | больше 1 года назад |
Уязвимостей на страницу