Page 3 of 17 results (0.006 seconds)

CVSS: 9.3EPSS: 0%CPEs: 32EXPL: 0

Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file. Una vulnerabilidad de ruta de búsqueda no confiable en EDE en CEDET antes de v1.0.1, tal como se utiliza en GNU Emacs antes de v23.4 y otros productos, permite a usuarios locales conseguir privilegios a través de una expresión Lisp modificada en un archivo Project.ede en el directorio, o en el directorio padre, de un archivo abierto. • http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072285.html http://lists.fedoraproject.org/pipermail/package-announce/2012-January/072288.html http://lists.gnu.org/archive/html/emacs-devel/2012-01/msg00387.html http://openwall.com/lists/oss-security/2012/01/10/2 http://openwall.com/lists/oss-security/2012/01/10/4 http://secunia.com/advisories/47311 http://secunia.com/advisories/47515 http://secunia.com/advisories/50801 http://sourceforge.net/mailarchive/mess •

CVSS: 6.3EPSS: 0%CPEs: 3EXPL: 1

The hack-local-variables function in Emacs before 22.2, when enable-local-variables is set to :safe, does not properly search lists of unsafe or risky variables, which might allow user-assisted attackers to bypass intended restrictions and modify critical program variables via a file containing a Local variables declaration. La función hack-local-variables en el Emacs anterior al 22.2, cuando el enable-local-variables está establecido a :safe, no busca correctamente las listas de las variables no seguras o de riesgo, lo que permite a permite a atacantes con la intervención del usuario evitar las restricciones y modificar variables de programa críticas a través de un fichero que contiene declaraciones de variables Locales. • https://www.exploit-db.com/exploits/30736 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449008 http://bugs.gentoo.org/show_bug.cgi?id=197958 http://cvs.savannah.gnu.org/viewvc/emacs/emacs/lisp/files.el?r1=1.896.2.28&r2=1.896.2.29 http://docs.info.apple.com/article.html?artnum=307562 http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html http://osvdb.org/42060 http://secunia.com/advisories/27508 http://secunia.com/advisories/27627 http:& •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Format string vulnerability in the movemail utility in (1) Emacs 20.x, 21.3, and possibly other versions, and (2) XEmacs 21.4 and earlier, allows remote malicious POP3 servers to execute arbitrary code via crafted packets. • http://marc.info/?l=bugtraq&m=110780416112719&w=2 http://www.debian.org/security/2005/dsa-670 http://www.debian.org/security/2005/dsa-671 http://www.debian.org/security/2005/dsa-685 http://www.mandriva.com/security/advisories?name=MDKSA-2005:038 http://www.redhat.com/support/errata/RHSA-2005-110.html http://www.redhat.com/support/errata/RHSA-2005-112.html http://www.redhat.com/support/errata/RHSA-2005-133.html http://www.securityfocus.com/archive/1/433928/3 •

CVSS: 1.2EPSS: 0%CPEs: 2EXPL: 0

rcs2log, as used in Emacs 20.4, xemacs 21.1.10 and other versions before 21.4, and possibly other packages, allows local users to modify files of other users via a symlink attack on a temporary file. • http://archives.neohapsis.com/archives/bugtraq/2001-08/0093.html http://savannah.gnu.org/cgi-bin/viewcvs/emacs/emacs/lib-src/rcs2log?only_with_tag=EMACS_PRETEST_21_0_95 http://www.iss.net/security_center/static/11210.php •

CVSS: 3.6EPSS: 0%CPEs: 7EXPL: 0

The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack. • http://www.securityfocus.com/bid/1126 http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de •