Show filters
1,191 Total Results
Displaying 111-120 of 1,191
Sort by:
Attacker Value
Unknown

CVE-2023-1579

Disclosure Date: April 03, 2023 (last updated October 08, 2023)
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
Attacker Value
Unknown

CVE-2023-28617

Disclosure Date: March 19, 2023 (last updated October 08, 2023)
org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.
Attacker Value
Unknown

CVE-2023-27986

Disclosure Date: March 09, 2023 (last updated October 08, 2023)
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to Emacs Lisp code injections through a crafted mailto: URI with unescaped double-quote characters. It is fixed in 29.0.90.
Attacker Value
Unknown

CVE-2023-27985

Disclosure Date: March 09, 2023 (last updated October 08, 2023)
emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification. It is fixed in 29.0.90
Attacker Value
Unknown

CVE-2023-25222

Disclosure Date: March 01, 2023 (last updated October 08, 2023)
A heap-based buffer overflow vulnerability exits in GNU LibreDWG v0.12.5 via the bit_read_RC function at bits.c.
Attacker Value
Unknown

CVE-2023-27371

Disclosure Date: February 28, 2023 (last updated October 08, 2023)
GNU libmicrohttpd before 0.9.76 allows remote DoS (Denial of Service) due to improper parsing of a multipart/form-data boundary in the postprocessor.c MHD_create_post_processor() method. This allows an attacker to remotely send a malicious HTTP POST packet that includes one or more '\0' bytes in a multipart/form-data boundary field, which - assuming a specific heap layout - will result in an out-of-bounds read and a crash in the find_boundary() function.
Attacker Value
Unknown

CVE-2023-25824

Disclosure Date: February 23, 2023 (last updated November 08, 2023)
Mod_gnutls is a TLS module for Apache HTTPD based on GnuTLS. Versions from 0.9.0 to 0.12.0 (including) did not properly fail blocking read operations on TLS connections when the transport hit timeouts. Instead it entered an endless loop retrying the read operation, consuming CPU resources. This could be exploited for denial of service attacks. If trace level logging was enabled, it would also produce an excessive amount of log output during the loop, consuming disk space. The problem has been fixed in commit d7eec4e598158ab6a98bf505354e84352f9715ec, please update to version 0.12.1. There are no workarounds, users who cannot update should apply the errno fix detailed in the security advisory.
Attacker Value
Unknown

CVE-2022-3219

Disclosure Date: February 23, 2023 (last updated October 08, 2023)
GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.
Attacker Value
Unknown

CVE-2022-48339

Disclosure Date: February 20, 2023 (last updated October 08, 2023)
An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has a command injection vulnerability. In the hfy-istext-command function, the parameter file and parameter srcdir come from external input, and parameters are not escaped. If a file name or directory name contains shell metacharacters, code may be executed.
Attacker Value
Unknown

CVE-2022-48338

Disclosure Date: February 20, 2023 (last updated October 08, 2023)
An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, the ruby-find-library-file function has a local command injection vulnerability. The ruby-find-library-file function is an interactive function, and bound to C-c C-f. Inside the function, the external command gem is called through shell-command-to-string, but the feature-name parameters are not escaped. Thus, malicious Ruby source files may cause commands to be executed.