Event JSON
{
"id": "06477a0fd546878fae6fb38231ff354b02c47ef8507ef48d45980435ffc9eacd",
"pubkey": "228b32ed09a04572a073f41d6cc9265a09a9c1edde47e92683b1675012f6c15d",
"created_at": 1740750213,
"kind": 1,
"tags": [
[
"t",
"news"
],
[
"t",
"software"
],
[
"t",
"gnu"
],
[
"t",
"emacs"
],
[
"t",
"security"
],
[
"t",
"hacking"
],
[
"t",
"terminal"
],
[
"t",
"linux"
],
[
"t",
"cve"
],
[
"t",
"opensource"
],
[
"t",
"freesoftware"
],
[
"proxy",
"https://ieji.de/users/LorenzoAncora/statuses/114081805969054549",
"activitypub"
]
],
"content": "GNU Emacs: new critical remote shell injection vulnerability.\n\nRed Hat discovered a command injection flaw in the text editor Emacs. It allows a remote, unauthenticated attacker to execute any command on your computer. The vulnerability is activated when you visit a malicious website or link.\n\nhttps://www.cve.org/CVERecord?id=CVE-2025-1244\n\n---\n\n#news #software #gnu #emacs #security #hacking #terminal #linux #cve #opensource #freesoftware \n\n---\n\nMitigation: uninstall/update immediately.",
"sig": "0d2bcfb80c7ef8ce81751e21770d6ad8627832404e6484a21717b385287d65607480c49c87280c313b8583ba77f3b77c45a92ebd87aed42adb1423310b8cd997"
}