Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-2491

EPSS 0.10% · P28
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-2491

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the Emacs text editor. Processing a specially crafted org-mode code with the "org-babel-execute:latex" function in ob-latex.el can result in arbitrary command execution. This CVE exists because of a CVE-2023-28617 security regression for the emacs package in Red Hat Enterprise Linux 8.8 and Red Hat Enterprise Linux 9.2.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red Hat Enterprise Linux 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red Hat Enterprise Linux是美国红帽(Red Hat)公司的面向企业用户的Linux操作系统 Red Hat Enterprise Linux存在安全漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-emacs Affects emacs v26.1-9.el8 and emacs v27.2-8.el9, Fixed in emacs v26.1-10.el8_8.2 and emacs v27.2-8.el9_2.1 -

II. Public POCs for CVE-2023-2491

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-2491

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-05-17 · 27 CVEs total

CVE-2023-301919.8 CRITICALPrestaShop SQL注入漏洞
CVE-2023-27683.5 LOWSucms cross site scripting
CVE-2023-31722Nasm 缓冲区错误漏洞
CVE-2023-1972GNU Binutils 缓冲区错误漏洞
CVE-2023-2203WebKitGTK 资源管理错误漏洞
CVE-2023-2731LibTIFF 代码问题漏洞
CVE-2023-1859Xen 资源管理错误漏洞
CVE-2023-2295Libreswan 安全漏洞
CVE-2023-2319Webpack 安全漏洞
CVE-2023-27233Piwigo SQL注入漏洞
CVE-2023-29837Exelysis Unified Communication Solutions 跨站脚本漏洞
CVE-2023-32767Symcon IP-Symcon 路径遍历漏洞
CVE-2023-31700TP-LINK TL-WPA4530 命令注入漏洞
CVE-2023-31701TP-LINK TL-WPA4530 命令注入漏洞
CVE-2023-31723yasm 安全漏洞
CVE-2023-31724yasm 安全漏洞
CVE-2023-31725yasm 资源管理错误漏洞
CVE-2023-31698Bludit 跨站脚本漏洞
CVE-2023-31699ChurchCRM 跨站脚本漏洞
CVE-2023-31702MicroWorld eScan Management Console SQL注入漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-2491

No comments yet


Leave a comment