
CVE-2017-14482 – emacs: command injection flaw within "enriched mode" handling
https://notcve.org/view.php?id=CVE-2017-14482
14 Sep 2017 — GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article). GNU Emacs en... • http://www.debian.org/security/2017/dsa-3975 • CWE-20: Improper Input Validation •

CVE-2014-9483
https://notcve.org/view.php?id=CVE-2014-9483
28 Aug 2017 — Emacs 24.4 allows remote attackers to bypass security restrictions. Emacs 24.4 permite a los atacantes remotos que omitan las restricciones de seguridad • http://www.openwall.com/lists/oss-security/2015/01/03/15 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2014-3421 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3421
08 May 2014 — lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file. lisp/gnus/gnus-fun.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre el archivo /tmp/gnus.face.ppm temporal. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks aga... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-3422 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3422
08 May 2014 — lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/. lisp/emacs-lisp/find-gc.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre un archivo temporal bajo /tmp/esrc/. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks ... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-3423 – Mandriva Linux Security Advisory 2014-118
https://notcve.org/view.php?id=CVE-2014-3423
08 May 2014 — lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file. lisp/net/browse-url.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre un archivo /tmp/Mosaic.##### temporal. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks again... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-3424 – Mandriva Linux Security Advisory 2015-117
https://notcve.org/view.php?id=CVE-2014-3424
08 May 2014 — lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file. lisp/net/tramp-sh.el en GNU Emacs 24.3 y anteriores permite a usuarios locales sobrescribir archivos arbitrarios a través de un ataque de enlace simbólico sobre un archivo /tmp/tramp.##### temporal. Steve Kemp discovered multiple temporary file handling issues in Emacs. A local attacker could use these flaws to perform symbolic link attacks against use... • http://advisories.mageia.org/MGASA-2014-0250.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2012-1103
https://notcve.org/view.php?id=CVE-2012-1103
25 Sep 2012 — emacs/notmuch-mua.el in Notmuch before 0.11.1, when using the Emacs interface, allows user-assisted remote attackers to read arbitrary files via crafted MML tags, which are not properly quoted in an email reply cna cause the files to be attached to the message. emacs/notmuch-mua.el en notmuch antes de v0.11.1, cuando se utiliza el interface Emacs, permite leer archivos de su elección a atacantes remotos con cierta ayuda de usuarios locales a través de etiquetas MML modificadas, que no están debidamente marc... • http://git.notmuchmail.org/git/notmuch/blobdiff/3f2050ac221a4c940c12442f156f12fff11600c6..ae438ccd8c77831158c7c30f19710d798ee4a6b4:/emacs/notmuch-mua.el • CWE-20: Improper Input Validation •

CVE-2012-3479 – Gentoo Linux Security Advisory 201403-05
https://notcve.org/view.php?id=CVE-2012-3479
25 Aug 2012 — lisp/files.el in Emacs 23.2, 23.3, 23.4, and 24.1 automatically executes eval forms in local-variable sections when the enable-local-variables option is set to :safe, which allows user-assisted remote attackers to execute arbitrary Emacs Lisp code via a crafted file. lisp/files.el en Emacs v23.2, v23.3, v23.4, y v24.1 ejecuta automáticamente formularios eval en secciones local-variable cuando la opcion en las secciones de variable local cuando la opción enable-local-variables está establecida en :safe, lo q... • http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155 •

CVE-2012-0035 – Gentoo Linux Security Advisory 201401-31
https://notcve.org/view.php?id=CVE-2012-0035
19 Jan 2012 — Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file. Una vulnerabilidad de ruta de búsqueda no confiable en EDE en CEDET antes de v1.0.1, tal como se utiliza en GNU Emacs antes de v23.4 y otros productos, permite a usuarios locales conseguir privilegios a través de una expresión Lisp modificada ... • http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072285.html •

CVE-2010-0825
https://notcve.org/view.php?id=CVE-2010-0825
05 Apr 2010 — lib-src/movemail.c in movemail in emacs 22 and 23 allows local users to read, modify, or delete arbitrary mailbox files via a symlink attack, related to improper file-permission checks. El fichero lib-src/movemail.c en la función movemail de emacs v22 y v23 permite a usuarios locales leer, modificar o borrar archivos de buzón aleatorios mediante un ataque de enlace simbólico, ocasionado por una comprobacion inadecuada de permisos de archivos. • http://secunia.com/advisories/39155 • CWE-264: Permissions, Privileges, and Access Controls •