emacs-common vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the emacs-common package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Arbitrary Code Injection

<1:27.2-14.el9_6.2
  • M
Arbitrary Code Injection

<1:27.2-14.el9_6.2
  • M
Arbitrary Code Injection

<1:27.2-14.el9_6.2
  • M
Arbitrary Code Injection

<1:27.2-14.el9_6.2
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • M
OS Command Injection

<1:27.2-8.el9
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Arbitrary Code Injection

<1:27.2-10.el9_4.2
  • M
Arbitrary Code Injection

<1:27.2-10.el9_4.2
  • M
Arbitrary Code Injection

<1:27.2-10.el9_4.2
  • M
Arbitrary Code Injection

<1:27.2-8.el9_2.3
  • M
Arbitrary Code Injection

<1:27.2-8.el9_2.3
  • M
Arbitrary Code Injection

<1:27.2-8.el9_2.3
  • M
Arbitrary Code Injection

<1:27.2-11.el9_5.2
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • H
OS Command Injection

<1:27.2-10.el9_4.1
  • H
OS Command Injection

<1:27.2-10.el9_4.1
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • H
OS Command Injection

<1:27.2-10.el9_4.1
  • H
OS Command Injection

<1:27.2-8.el9_2.2
  • H
OS Command Injection

<1:27.2-8.el9_2.2
  • H
OS Command Injection

<1:27.2-8.el9_2.2
  • H
OS Command Injection

<1:27.2-6.el9_0.2
  • H
OS Command Injection

<1:27.2-11.el9_5.1
  • M
Arbitrary Code Injection

<1:27.2-14.el9_6.2
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
OS Command Injection

<1:27.2-8.el9
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • M
Eval Injection

<1:27.2-10.el9_4
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • M
Acceptance of Extraneous Untrusted Data With Trusted Data

<1:27.2-10.el9
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_0.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_0.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-6.el9_1.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • H
Arbitrary Command Injection

<1:27.2-8.el9_2.1
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • M
OS Command Injection

<1:27.2-8.el9
  • L
Incorrect Privilege Assignment

*