Bug | Description |
---|
CVE-2024-39331 | In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a % ... |
CVE-2024-30205 | In Emacs before 29.3, Org mode considers contents of remote files to b ... |
CVE-2024-30204 | In Emacs before 29.3, LaTeX preview is enabled by default for e-mail a ... |
CVE-2024-30203 | In Emacs before 29.3, Gnus treats inline MIME contents as trusted. |
CVE-2024-30202 | In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turn ... |
CVE-2023-28617 | org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for G ... |
CVE-2023-27986 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to E ... |
CVE-2023-27985 | emacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to s ... |
CVE-2023-2491 | A flaw was found in the Emacs text editor. Processing a specially craf ... |
CVE-2022-48339 | An issue was discovered in GNU Emacs through 28.2. htmlfontify.el has ... |
CVE-2022-48338 | An issue was discovered in GNU Emacs through 28.2. In ruby-mode.el, th ... |
CVE-2022-48337 | GNU Emacs through 28.2 allows attackers to execute commands via shell ... |
CVE-2022-45939 | GNU Emacs through 28.2 allows attackers to execute commands via shell ... |
CVE-2017-14482 | GNU Emacs before 25.3 allows remote attackers to execute arbitrary cod ... |