漏洞描述 Emacs是一个功能强大的可扩展的实时显示文本编辑器。 GNU Emacs中存在漏洞,可被恶意攻击者利用操控用户系统。该漏洞源于评估本地文件变量时,处理‘enable-local-variables’变量存在错误。攻击者可利用该漏洞提升‘eval’表单并执行任意Lisp代码。成功的利用需要将‘enable-local-variables’设置为‘:safe’。GNU Emacs 23.2、23.3、23.4、24.1版本中存在漏洞。
相关漏洞推荐 POC nocodb-public-registration-enabled: NocoDB Public Registration Enabled POC remotely-registration-enabled: Remotely Registration Enabled POC wp-enable-media-replace-log: WordPress Plugin Enable Media Replace - Log File Exposure Centreon Web /centreon/api/latest/authentication/providers/configurations/local 默认口令漏洞 云课网校系统 /api/uploader/localupload 文件上传漏洞 Pterodactyl Panel /locales/locale.json 信息泄露漏洞(CVE-2025-49132) 泛微 E-weaver /api/ec/dev/locale/getLabelByModule 存在SQL注入漏洞 mapgis-cloud-manager-local-file-read: MapGis Cloud Manager Local File Read POC CVE-2019-0232: Apache Tomcat `CGIServlet` enableCmdLineArguments - Remote Code Execution POC kubernetes-dashboard-enabled: Kubernetes Dashboard for ACK Clusters - Enabled POC password-policy-reuse-enabled: RAM Password Policy Reuse - Enabled POC s3-object-lock-not-enabled: CloudTrail S3 Object Lock POC iam-mfa-enable: MFA not enabled for AWS IAM Console User