Количество 13
Количество 13

CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-45939
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell ...

SUSE-SU-2022:4310-1
Security update for emacs

SUSE-SU-2022:4305-1
Security update for emacs

SUSE-SU-2022:4304-1
Security update for emacs
GHSA-m57w-hf24-4j3h
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
ELSA-2023-3042
ELSA-2023-3042: emacs security and bug fix update (MODERATE)
ELSA-2023-2366
ELSA-2023-2366: emacs security and bug fix update (MODERATE)

BDU:2024-05926
Уязвимость файла lib-src/etags.c компонента ctags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код

ROS-20240731-01
Множественные уязвимости emacs
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4310-1 Security update for emacs | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4305-1 Security update for emacs | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4304-1 Security update for emacs | 0% Низкий | больше 2 лет назад | |
GHSA-m57w-hf24-4j3h GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
ELSA-2023-3042 ELSA-2023-3042: emacs security and bug fix update (MODERATE) | около 2 лет назад | |||
ELSA-2023-2366 ELSA-2023-2366: emacs security and bug fix update (MODERATE) | около 2 лет назад | |||
![]() | BDU:2024-05926 Уязвимость файла lib-src/etags.c компонента ctags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20240731-01 Множественные уязвимости emacs | CVSS3: 7.8 | 11 месяцев назад |
Уязвимостей на страницу