Количество 13
Количество 13
BDU:2024-05926
Уязвимость файла lib-src/etags.c компонента ctags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
ROS-20240731-01
Множественные уязвимости emacs
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
CVE-2022-45939
GNU Emacs through 28.2 allows attackers to execute commands via shell ...
SUSE-SU-2022:4310-1
Security update for emacs
SUSE-SU-2022:4305-1
Security update for emacs
SUSE-SU-2022:4304-1
Security update for emacs
GHSA-m57w-hf24-4j3h
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
ELSA-2023-3042
ELSA-2023-3042: emacs security and bug fix update (MODERATE)
ELSA-2023-2366
ELSA-2023-2366: emacs security and bug fix update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2024-05926 Уязвимость файла lib-src/etags.c компонента ctags текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ROS-20240731-01 Множественные уязвимости emacs | CVSS3: 7.8 | больше 1 года назад | ||
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
CVE-2022-45939 GNU Emacs through 28.2 allows attackers to execute commands via shell ... | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
SUSE-SU-2022:4310-1 Security update for emacs | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4305-1 Security update for emacs | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4304-1 Security update for emacs | 0% Низкий | около 3 лет назад | ||
GHSA-m57w-hf24-4j3h GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ELSA-2023-3042 ELSA-2023-3042: emacs security and bug fix update (MODERATE) | больше 2 лет назад | |||
ELSA-2023-2366 ELSA-2023-2366: emacs security and bug fix update (MODERATE) | больше 2 лет назад |
Уязвимостей на страницу