CVE-2026-6861
- EPSS 0.02%
- Veröffentlicht 22.04.2026 14:17:07
- Zuletzt bearbeitet 06.05.2026 20:27:36
A flaw was found in GNU Emacs. This vulnerability, a memory corruption issue, occurs when Emacs processes specially crafted SVG (Scalable Vector Graphics) CSS (Cascading Style Sheets) data. A local user could exploit this by convincing a victim to op...
CVE-2024-53920
- EPSS 0.05%
- Veröffentlicht 27.11.2024 15:15:26
- Zuletzt bearbeitet 03.11.2025 21:17:48
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This...
CVE-2024-39331
- EPSS 0.44%
- Veröffentlicht 23.06.2024 22:15:09
- Zuletzt bearbeitet 30.04.2025 16:44:51
In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.
CVE-2024-30205
- EPSS 0.03%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:32:31
In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.
CVE-2024-30204
- EPSS 0.02%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:32
In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.
CVE-2024-30203
- EPSS 0.03%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:44
In Emacs before 29.3, Gnus treats inline MIME contents as trusted.
CVE-2024-30202
- EPSS 0.05%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:59
In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.
CVE-2023-2491
- EPSS 0.1%
- Veröffentlicht 17.05.2023 22:15:10
- Zuletzt bearbeitet 22.01.2025 19:15:09
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regress...
CVE-2023-27986
- EPSS 0.21%
- Veröffentlicht 09.03.2023 06:15:33
- Zuletzt bearbeitet 05.03.2025 18:15:35
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
CVE-2023-27985
- EPSS 0.13%
- Veröffentlicht 09.03.2023 06:15:32
- Zuletzt bearbeitet 05.03.2025 17:15:12
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90