cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-2491,https://securityvulnerability.io/vulnerability/CVE-2023-2491,Arbitrary Command Execution Vulnerability in Emacs Text Editor by Red Hat,"A vulnerability exists in the Emacs text editor that allows an attacker to execute arbitrary commands through the processing of specially crafted org-mode code. The flaw specifically lies in the 'org-babel-execute:latex' function within the ob-latex.el file. This vulnerability is a consequence of another identified security regression, providing a potential attack vector on Red Hat Enterprise Linux versions 8.8 and 9.2.",Gnu,emacs,7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-05-17T00:00:00.000Z,0 CVE-2023-27986,https://securityvulnerability.io/vulnerability/CVE-2023-27986,Emacs Lisp Code Injection in Emacs 28.1 to 28.2,"The emacsclient-mail.desktop file in Emacs versions 28.1 and 28.2 is susceptible to code injection attacks via specially crafted mailto: URIs containing unescaped double-quote characters. This vulnerability enables potential attackers to execute arbitrary Emacs Lisp code, compromising user systems. The issue has been addressed in Emacs version 29.0.90, making it essential for users of the affected versions to update promptly to enhance their security posture.",Gnu,Emacs,7.8,HIGH,0.0007900000200606883,false,false,false,false,,false,false,2023-03-09T00:00:00.000Z,0 CVE-2023-27985,https://securityvulnerability.io/vulnerability/CVE-2023-27985,Shell Command Injection Vulnerability in Emacs Client by GNU,"The emacsclient-mail.desktop file in Emacs versions 28.1 through 28.2 is susceptible to shell command injections via specially crafted mailto: URIs. This vulnerability arises from a failure to comply with the Desktop Entry Specification, allowing attackers to potentially execute arbitrary commands. This issue has been addressed in version 29.0.90, highlighting the importance of software updates for maintaining security.",Gnu,Emacs,7.8,HIGH,0.0008900000248104334,false,false,false,false,,false,false,2023-03-09T00:00:00.000Z,0 CVE-2022-48338,https://securityvulnerability.io/vulnerability/CVE-2022-48338,Local Command Injection Vulnerability in GNU Emacs Ruby Mode,"A local command injection vulnerability exists in GNU Emacs through version 28.2 specifically in the ruby-mode.el file. The interactive function ruby-find-library-file, bound to the shortcut C-c C-f, allows execution of external commands without proper escaping of parameters. This flaw poses a risk as malicious Ruby source files could exploit this weakness to execute arbitrary commands, compromising system integrity and security.",Gnu,Emacs,7.3,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-02-20T00:00:00.000Z,0 CVE-2022-48337,https://securityvulnerability.io/vulnerability/CVE-2022-48337,Command Execution Vulnerability in GNU Emacs by GNU,"GNU Emacs versions up to 28.2 suffer from a vulnerability that enables attackers to execute arbitrary commands through shell metacharacters in the names of source-code files. This issue arises from the use of the system C library function in the implementation of the etags program found in lib-src/etags.c. A typical scenario occurs when an unsuspecting user executes commands like 'etags -u *' in a directory containing files influenced by untrusted input, allowing the execution of unintended commands.",Gnu,Emacs,9.8,CRITICAL,0.0029800001066178083,false,false,false,false,,false,false,2023-02-20T00:00:00.000Z,0 CVE-2022-48339,https://securityvulnerability.io/vulnerability/CVE-2022-48339,Command Injection Vulnerability in GNU Emacs by GNU,A vulnerability has been identified in GNU Emacs that allows for command injection through the 'hfy-istext-command' function. The function improperly handles user-supplied input for file and directory parameters without escaping potentially harmful shell metacharacters. This oversight could lead to the execution of arbitrary code if an attacker manipulates file or directory names. It is crucial for users to update to the latest version to mitigate this risk.,Gnu,Emacs,7.8,HIGH,0.0008099999977275729,false,false,false,false,,false,false,2023-02-20T00:00:00.000Z,0 CVE-2022-45939,https://securityvulnerability.io/vulnerability/CVE-2022-45939,,"GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the ""ctags *"" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.",Gnu,Emacs,7.8,HIGH,0.0007699999841861427,false,false,false,false,,false,false,2022-11-28T00:00:00.000Z,0 CVE-2017-1000383,https://securityvulnerability.io/vulnerability/CVE-2017-1000383,,"GNU Emacs version 25.3.1 (and other versions most likely) ignores umask when creating a backup save file (""[ORIGINAL_FILENAME]~"") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the emacs binary.",Gnu,Emacs,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2017-10-31T20:00:00.000Z,0 CVE-2017-14482,https://securityvulnerability.io/vulnerability/CVE-2017-14482,,"GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted ""Content-Type: text/enriched"" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).",Gnu,Emacs,8.8,HIGH,0.031050000339746475,false,false,false,false,,false,false,2017-09-14T16:00:00.000Z,0 CVE-2014-9483,https://securityvulnerability.io/vulnerability/CVE-2014-9483,,Emacs 24.4 allows remote attackers to bypass security restrictions.,Gnu,Emacs,7.5,HIGH,0.0021800000686198473,false,false,false,false,,false,false,2017-08-28T15:00:00.000Z,0 CVE-2014-3422,https://securityvulnerability.io/vulnerability/CVE-2014-3422,,lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.,Gnu,Emacs,,,0.0004199999966658652,false,false,false,false,,false,false,2014-05-08T10:00:00.000Z,0 CVE-2012-3479,https://securityvulnerability.io/vulnerability/CVE-2012-3479,,"lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file.",Gnu,Emacs,,,0.010420000180602074,false,false,false,false,,false,false,2012-08-25T10:00:00.000Z,0 CVE-2012-0035,https://securityvulnerability.io/vulnerability/CVE-2012-0035,,"Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.",Gnu,"Emacs,Cedet",,,0.008460000157356262,false,false,false,false,,false,false,2012-01-19T15:00:00.000Z,0 CVE-2010-0825,https://securityvulnerability.io/vulnerability/CVE-2010-0825,,"lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.",Gnu,Emacs,,,0.0004199999966658652,false,false,false,false,,false,false,2010-04-05T15:15:00.000Z,0 CVE-2008-2142,https://securityvulnerability.io/vulnerability/CVE-2008-2142,,"Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.",Gnu,"Emacs,Xemacs",,,0.0038300000596791506,false,false,false,false,,false,false,2008-05-12T19:00:00.000Z,0 CVE-2008-1694,https://securityvulnerability.io/vulnerability/CVE-2008-1694,,"vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.",Gnu,"Emacs,Sccs",,,0.0004199999966658652,false,false,false,false,,false,false,2008-04-22T04:41:00.000Z,0 CVE-2007-6109,https://securityvulnerability.io/vulnerability/CVE-2007-6109,,"Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain ""emacs -batch -eval"" command line.",Gnu,Emacs,,,0.014499999582767487,false,false,false,false,,false,false,2007-12-07T11:00:00.000Z,0 CVE-2007-5795,https://securityvulnerability.io/vulnerability/CVE-2007-5795,,"The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration.",Gnu,Emacs,,,0.0008999999845400453,false,false,false,false,,false,false,2007-11-02T22:00:00.000Z,0 CVE-2005-0100,https://securityvulnerability.io/vulnerability/CVE-2005-0100,,"Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.",Gnu,"Emacs,Xemacs",,,0.007060000207275152,false,false,false,false,,false,false,2005-02-07T05:00:00.000Z,0 CVE-2003-1232,https://securityvulnerability.io/vulnerability/CVE-2003-1232,,"Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted attackers to execute arbitrary commands, as demonstrated using the mode-name variable.",Gnu,Emacs,,,0.017069999128580093,false,false,false,false,,false,false,2003-12-31T05:00:00.000Z,0 CVE-2001-1301,https://securityvulnerability.io/vulnerability/CVE-2001-1301,,"rcs2log, as used in Emacs 20.4, xemacs 21.1.10 and other versions before 21.4, and possibly other packages, allows local users to modify files of other users via a symlink attack on a temporary file.",Gnu,"Emacs,Xemacs",,,0.0004199999966658652,false,false,false,false,,false,false,2001-08-07T04:00:00.000Z,0 CVE-2000-0271,https://securityvulnerability.io/vulnerability/CVE-2000-0271,,"read-passwd and other Lisp functions in Emacs 20 do not properly clear the history of recently typed keys, which allows an attacker to read unencrypted passwords.",Gnu,Emacs,,,0.00044999999227002263,false,false,false,false,,false,false,2000-04-18T04:00:00.000Z,0 CVE-2000-0270,https://securityvulnerability.io/vulnerability/CVE-2000-0270,,"The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.",Gnu,Emacs,,,0.00044999999227002263,false,false,false,false,,false,false,2000-04-18T04:00:00.000Z,0 CVE-2000-0269,https://securityvulnerability.io/vulnerability/CVE-2000-0269,,"Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.",Gnu,Emacs,,,0.00044999999227002263,false,false,false,false,,false,false,2000-04-18T04:00:00.000Z,0