CVE-2024-53920
- EPSS 0.12%
- Veröffentlicht 27.11.2024 15:15:26
- Zuletzt bearbeitet 30.04.2025 16:21:59
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This...
CVE-2024-39331
- EPSS 0.24%
- Veröffentlicht 23.06.2024 22:15:09
- Zuletzt bearbeitet 30.04.2025 16:44:51
In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.
CVE-2024-30205
- EPSS 0.03%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:32:31
In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.
CVE-2024-30204
- EPSS 0.02%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:32
In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.
CVE-2024-30203
- EPSS 0.03%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:44
In Emacs before 29.3, Gnus treats inline MIME contents as trusted.
CVE-2024-30202
- EPSS 0.05%
- Veröffentlicht 25.03.2024 15:15:52
- Zuletzt bearbeitet 01.05.2025 14:33:59
In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.
CVE-2023-2491
- EPSS 0.06%
- Veröffentlicht 17.05.2023 22:15:10
- Zuletzt bearbeitet 22.01.2025 19:15:09
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regress...
CVE-2023-27986
- EPSS 0.07%
- Veröffentlicht 09.03.2023 06:15:33
- Zuletzt bearbeitet 05.03.2025 18:15:35
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
CVE-2023-27985
- EPSS 0.06%
- Veröffentlicht 09.03.2023 06:15:32
- Zuletzt bearbeitet 05.03.2025 17:15:12
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
CVE-2022-48339
- EPSS 0.09%
- Veröffentlicht 20.02.2023 23:15:12
- Zuletzt bearbeitet 18.03.2025 16:15:15
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file n...