emacs is vulnerable to Arbitrary Code Execution. The vulnerability is due to a lack of proper validation of user input during the activation process of Org mode in Emacs, allowing the execution of arbitrary Lisp code during the activation process.
www.openwall.com/lists/oss-security/2024/03/25/2
www.openwall.com/lists/oss-security/2024/04/08/6
git.savannah.gnu.org/cgit/emacs.git/commit/?h=emacs-29&id=befa9fcaae29a6c9a283ba371c3c5234c7f644eb
git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-29
git.savannah.gnu.org/cgit/emacs/org-mode.git/commit/?id=003ddacf1c8d869b1858181c29ea21b731a8d8d9
security-tracker.debian.org/tracker/CVE-2024-30202