Vulnerabilities (CVE)

Filtered by vendor Gnu Subscribe
Filtered by product Emacs
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-48339 1 Gnu 1 Emacs 2023-08-08 N/A 7.8 HIGH
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
CVE-2017-14482 2 Debian, Gnu 2 Debian Linux, Emacs 2019-10-03 6.8 MEDIUM 8.8 HIGH
GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article).
CVE-2014-9483 1 Gnu 1 Emacs 2017-09-08 5.0 MEDIUM 7.5 HIGH
Emacs 24.4 allows remote attackers to bypass security restrictions.