Количество 11
Количество 11

CVE-2023-28617
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

CVE-2023-28617
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

CVE-2023-28617
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

CVE-2023-28617
CVE-2023-28617
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for G ...

ROS-20250814-12
Уязвимость emacs

RLSA-2023:2074
Important: emacs security update

RLSA-2023:1930
Important: emacs security update
GHSA-xwfh-qqww-gr22
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
ELSA-2023-2074
ELSA-2023-2074: emacs security update (IMPORTANT)
ELSA-2023-1930
ELSA-2023-1930: emacs security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-28617 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-28617 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-28617 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2023-28617 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for G ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
![]() | ROS-20250814-12 Уязвимость emacs | CVSS3: 7.8 | 0% Низкий | 4 дня назад |
![]() | RLSA-2023:2074 Important: emacs security update | 0% Низкий | больше 2 лет назад | |
![]() | RLSA-2023:1930 Important: emacs security update | 0% Низкий | больше 2 лет назад | |
GHSA-xwfh-qqww-gr22 org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
ELSA-2023-2074 ELSA-2023-2074: emacs security update (IMPORTANT) | больше 2 лет назад | |||
ELSA-2023-1930 ELSA-2023-1930: emacs security update (IMPORTANT) | больше 2 лет назад |
Уязвимостей на страницу