{"vulnerability": "CVE-2023-27985", "sightings": [{"uuid": "427fab9d-4d18-451a-8a98-8ac48f7bf636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27985", "type": "seen", "source": "Telegram/RqiRgA5mamRzgQDy7J8YCgnjQlybeoCP75YrjLoIRciK6Ahb", "content": "", "creation_timestamp": "2025-03-06T02:16:32.000000Z"}, {"uuid": "c6c6d023-0c46-49d7-8c16-8213118c9e80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-27985", "type": "seen", "source": "https://t.me/cibsecurity/59719", "content": "\u203c CVE-2023-27985 \u203c\n\nemacsclient-mail.desktop in Emacs 28.1 through 28.2 is vulnerable to shell command injections through a crafted mailto: URI. This is related to lack of compliance with the Desktop Entry Specification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-03-09T12:20:06.000000Z"}]}