Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1101-1 | emacs23 security update |
Debian DSA |
DSA-3975-1 | emacs25 security update |
EUVD |
EUVD-2017-5985 | GNU Emacs before 25.3 allows remote attackers to execute arbitrary code via email with crafted "Content-Type: text/enriched" data containing an x-display XML element that specifies execution of shell commands, related to an unsafe text/enriched extension in lisp/textmodes/enriched.el, and unsafe Gnus support for enriched and richtext inline MIME objects in lisp/gnus/mm-view.el. In particular, an Emacs user can be instantly compromised by reading a crafted email message (or Usenet news article). |
Ubuntu USN |
USN-3427-1 | Emacs vulnerability |
Ubuntu USN |
USN-3428-1 | Emacs vulnerability |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T19:27:40.893Z
Reserved: 2017-09-14T00:00:00.000Z
Link: CVE-2017-14482
No data.
Status : Modified
Published: 2017-09-14T16:29:00.250
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-14482
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN