Количество 36
Количество 36

ROS-20240731-01
Множественные уязвимости emacs

CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

CVE-2022-48337
CVE-2022-48337
GNU Emacs through 28.2 allows attackers to execute commands via shell ...

CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.

CVE-2022-48339
CVE-2022-48339
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has ...
GHSA-8hw9-jqh3-h2rx
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input.

BDU:2024-06036
Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
GHSA-jwxq-f9vm-725g
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
ELSA-2023-3481
ELSA-2023-3481: emacs security update (MODERATE)

BDU:2024-06037
Уязвимость функции hfy-istext-command текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | ROS-20240731-01 Множественные уязвимости emacs | CVSS3: 7.8 | 11 месяцев назад | |
![]() | CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.3 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
CVE-2022-48337 GNU Emacs through 28.2 allows attackers to execute commands via shell ... | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2022-48339 An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-48339 An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-48339 An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
CVE-2022-48339 An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has ... | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад | |
GHSA-8hw9-jqh3-h2rx GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "etags -u *" command (suggested in the etags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2024-06036 Уязвимость файла lib-src/etags.c компонента etags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад |
GHSA-jwxq-f9vm-725g An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
ELSA-2023-3481 ELSA-2023-3481: emacs security update (MODERATE) | около 2 лет назад | |||
![]() | BDU:2024-06037 Уязвимость функции hfy-istext-command текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу