Vulnerabilities > GNU > Emacs > Critical

DATE CVE VULNERABILITY TITLE RISK
2023-02-20 CVE-2022-48337 OS Command Injection vulnerability in multiple products
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the etags program.
network
low complexity
gnu debian CWE-78
critical
9.8
2012-01-19 CVE-2012-0035 Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
network
eric-m-ludlam gnu
critical
9.3
2007-12-07 CVE-2007-6109 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in GNU Emacs
Stack-based buffer overflow in emacs allows user-assisted attackers to cause a denial of service (application crash) and possibly have unspecified other impact via a large precision value in an integer format string specifier to the format function, as demonstrated via a certain "emacs -batch -eval" command line.
network
low complexity
gnu CWE-119
critical
10.0