Логотип exploitDog
bind: "CVE-2022-48337"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2022-48337"

Количество 13

Количество 13

ubuntu логотип

CVE-2022-48337

больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
EPSS: Низкий
redhat логотип

CVE-2022-48337

больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2022-48337

больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
EPSS: Низкий
msrc логотип

CVE-2022-48337

больше 2 лет назад

CVSS3: 9.8
EPSS: Низкий
debian логотип

CVE-2022-48337

больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell ...

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-8hw9-jqh3-h2rx

больше 2 лет назад

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2024-06036

больше 2 лет назад

Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0675-1

больше 2 лет назад

Security update for emacs

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0597-1

больше 2 лет назад

Security update for emacs

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7083

больше 1 года назад

ELSA-2023-7083: emacs security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:0598-1

больше 2 лет назад

Security update for emacs

EPSS: Низкий
redos логотип

ROS-20240806-06

11 месяцев назад

Множественные уязвимости emacs

CVSS3: 9.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-2626

около 2 лет назад

ELSA-2023-2626: emacs security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 7.3
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 9.8
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-48337

GNU Emacs through 28.2 allows attackers to execute commands via shell ...

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-8hw9-jqh3-h2rx

GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2024-06036

Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
0%
Низкий
больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0675-1

Security update for emacs

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:0597-1

Security update for emacs

больше 2 лет назад
oracle-oval логотип
ELSA-2023-7083

ELSA-2023-7083: emacs security update (MODERATE)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:0598-1

Security update for emacs

больше 2 лет назад
redos логотип
ROS-20240806-06

Множественные уязвимости emacs

CVSS3: 9.8
11 месяцев назад
oracle-oval логотип
ELSA-2023-2626

ELSA-2023-2626: emacs security update (IMPORTANT)

около 2 лет назад

Уязвимостей на страницу