Gnu

Emacs

34 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 2.29%
  • Veröffentlicht 25.08.2012 10:29:51
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code vi...

  • EPSS 4.03%
  • Veröffentlicht 19.01.2012 15:55:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, ...

  • EPSS 0.12%
  • Veröffentlicht 05.04.2010 15:30:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks.

Exploit
  • EPSS 4.36%
  • Veröffentlicht 12.05.2008 19:20:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.

  • EPSS 0.07%
  • Veröffentlicht 22.04.2008 04:41:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

vcdiff in Emacs 20.7 to 22.1.50, when used with SCCS, allows local users to overwrite arbitrary files via a symlink attack on temporary files.

  • EPSS 3.13%
  • Veröffentlicht 07.12.2007 11:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, ...

  • EPSS 1.01%
  • Veröffentlicht 02.11.2007 22:46:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify cri...

  • EPSS 1.34%
  • Veröffentlicht 21.06.2007 20:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Emacs 21 allows user-assisted attackers to cause a denial of service (crash) via certain crafted images, as demonstrated via a GIF image in vm mode, related to image size calculation.

  • EPSS 2.85%
  • Veröffentlicht 07.02.2005 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets.

  • EPSS 6.48%
  • Veröffentlicht 31.12.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted attackers to execute arbitrary commands, as demonstrated using the mode-name variable.