Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
emacs vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2003-1232
Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted malicious users to execute arbitrary commands, as demonstrated using the mode-name variable.
Gnu Emacs 21.2.1
1 EDB exploit
5
CVSSv2
CVE-2014-9483
Emacs 24.4 allows remote malicious users to bypass security restrictions.
Gnu Emacs 24.4
6.8
CVSSv2
CVE-2008-2142
Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted malicious users to execute arbitrary code.
Gnu Emacs 21.3.1
Gnu Xemacs
7.8
CVSSv2
CVE-2007-2833
Emacs 21 allows user-assisted malicious users to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.
Debian Debian Linux 4.0
Gnu Emacs 21
4.6
CVSSv2
CVE-2003-0537
The liece Emacs IRC client 2.0+0.20030527 and previous versions creates temporary files insecurely, which could allow local users to overwrite arbitrary files as other users.
Daiki Ueno Liece Emacs Irc Client
1.2
CVSSv2
CVE-2001-1301
rcs2log, as used in Emacs 20.4, xemacs 21.1.10 and other versions prior to 21.4, and possibly other packages, allows local users to modify files of other users via a symlink attack on a temporary file.
Gnu Emacs 20.4
Xemacs Xemacs 21.1.10
NA
CVE-2022-48337
GNU Emacs up to and including 28.2 allows malicious users to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program. For example, a victim may use the "...
Gnu Emacs
Debian Debian Linux 11.0
NA
CVE-2022-45939
GNU Emacs up to and including 28.2 allows malicious users to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "...
Gnu Emacs
Debian Debian Linux 10.0
Debian Debian Linux 11.0
Fedoraproject Fedora 36
Fedoraproject Fedora 37
NA
CVE-2023-2491
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs pa...
Gnu Emacs 26.1-9.el8
Gnu Emacs 27.2-8.el9
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
Redhat Enterprise Linux Server Tus 8.8
Redhat Enterprise Linux Server Aus 8.8
Redhat Enterprise Linux Eus 8.8
Redhat Enterprise Linux Server Aus 9.2
Redhat Enterprise Linux Eus 9.2
NA
CVE-2024-30203
In Emacs prior to 29.3, Gnus treats inline MIME contents as trusted.
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-3581
reflected XSS
CVE-2024-26925
CVE-2024-27956
LFI
CVE-2024-3607
CVE-2024-3107
CVE-2024-3295
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »