CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

gnu

org_mode

5 known vulnerabilities · sorted by CVSS score

CVE-2024-30202
HIGH7.8

In Emacs before 29.3, arbitrary Lisp code is evaluated as part of turning on Org mode. This affects Org Mode before 9.6.23.

gnu / emacs+1
Local
Published Mar 25, 2024
CVE-2023-28617
HIGH7.8

org-babel-execute:latex in ob-latex.el in Org Mode through 9.6.1 for GNU Emacs allows attackers to execute arbitrary commands via a file name or directory name that contains shell metacharacters.

gnu / org_mode
Local
Published Mar 19, 2023
CVE-2024-30205
HIGH7.1

In Emacs before 29.3, Org mode considers contents of remote files to be trusted. This affects Org Mode before 9.6.23.

gnu / emacs+2
Local
Published Mar 25, 2024
CVE-2024-30203
MEDIUM5.5

In Emacs before 29.3, Gnus treats inline MIME contents as trusted.

gnu / emacs+2
Local
Published Mar 25, 2024
CVE-2024-30204
LOW2.8

In Emacs before 29.3, LaTeX preview is enabled by default for e-mail attachments.

gnu / emacs+2
Local
Published Mar 25, 2024