This page displays vulnerability information about FreeBSD Ports.
The VUXML data was last processed by FreshPorts on 2024-04-24 21:00:48 UTC
List all Vulnerabilities, by package
List all Vulnerabilities, by date
k68These are the vulnerabilities relating to the commit you have selected:
VuXML ID | Description |
---|---|
3e3c860d-7dae-11d9-a9e7-0001020eed82 | emacs -- movemail format string vulnerability Max Vozeler discovered several format string vulnerabilities in the movemail utility of Emacs. They can be exploited when connecting to a malicious POP server and can allow an attacker can execute arbitrary code under the privileges of the user running Emacs. Discovery 2005-01-31 Entry 2005-02-14 movemail le 1.0 zh-emacs emacs < 20.7_4 gt 21.* lt 21.3_4 xemacs xemacs-mule zh-xemacs zh-xemacs-mule < 21.4.17 xemacs-devel < 21.5.b19,1 xemacs-devel-21.5 eq b11 xemacs-devel-mule < 21.5.b19 mule-common hanemacs gt 0 CVE-2005-0100 12462 |
66657bd5-ac92-11dd-b541-001f3b19d541 | emacs -- run-python vulnerability Emacs developers report:
Discovery 2008-09-05 Entry 2008-11-07 Modified 2010-05-02 emacs ge 22 le 22.2_1 CVE-2008-3949 http://lists.gnu.org/archive/html/emacs-devel/2008-09/msg00215.html |
76e2fcce-92d2-11ed-a635-080027f5fec9 | emacs -- arbitary shell command execution vulnerability of ctags lu4nx reports:
Discovery 2022-11-28 Entry 2023-01-12 emacs emacs-canna emacs-nox < 28.2_2,3 emacs-devel emacs-devel-nox < 30.0.50.202211128,2 CVE-2022-45939 https://nvd.nist.gov/vuln/detail/CVE-2022-45939 |
c1e5f35e-f93d-11e1-b07f-00235a5f2c9a | emacs -- remote code execution vulnerability Chong Yidong reports:
Discovery 2012-08-13 Entry 2012-09-08 Modified 2013-05-13 emacs gt 24.* lt 24.2 gt 23.* le 23.4_2 54969 CVE-2012-3479 https://lists.gnu.org/archive/html/emacs-devel/2012-08/msg00802.html http://debbugs.gnu.org/cgi/bugreport.cgi?bug=12155 |