Количество 13
Количество 13

CVE-2024-53920
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVE-2024-53920
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVE-2024-53920
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)

CVE-2024-53920
CVE-2024-53920
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invok ...

SUSE-SU-2025:0798-1
Security update for emacs

SUSE-SU-2024:4392-1
Security update for emacs

RLSA-2025:11030
Moderate: emacs security update
GHSA-8737-h7fg-9xgj
In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
ELSA-2025-9448
ELSA-2025-9448: emacs security update (MODERATE)
ELSA-2025-4787
ELSA-2025-4787: emacs security update (MODERATE)
ELSA-2025-11030
ELSA-2025-11030: emacs security update (MODERATE)

BDU:2024-10771
Уязвимость функции elisp-completion-at-point() и elisp-flymake-byte-compile() режима ELisp текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-53920 In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-53920 In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
![]() | CVE-2024-53920 In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад |
![]() | CVSS3: 7.8 | 0% Низкий | 4 месяца назад | |
CVE-2024-53920 In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invok ... | CVSS3: 7.8 | 0% Низкий | 8 месяцев назад | |
![]() | SUSE-SU-2025:0798-1 Security update for emacs | 0% Низкий | 5 месяцев назад | |
![]() | SUSE-SU-2024:4392-1 Security update for emacs | 0% Низкий | 8 месяцев назад | |
![]() | RLSA-2025:11030 Moderate: emacs security update | 0% Низкий | 8 дней назад | |
GHSA-8737-h7fg-9xgj In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.) | CVSS3: 9.8 | 0% Низкий | 8 месяцев назад | |
ELSA-2025-9448 ELSA-2025-9448: emacs security update (MODERATE) | около 1 месяца назад | |||
ELSA-2025-4787 ELSA-2025-4787: emacs security update (MODERATE) | 3 месяца назад | |||
ELSA-2025-11030 ELSA-2025-11030: emacs security update (MODERATE) | 22 дня назад | |||
![]() | BDU:2024-10771 Уязвимость функции elisp-completion-at-point() и elisp-flymake-byte-compile() режима ELisp текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 0% Низкий | 12 месяцев назад |
Уязвимостей на страницу