Description
A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.
References (2)
Core 2
Core References
Exploit, Third Party Advisory
https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744
Third Party Advisory
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744
Scores
CVSS v3
7.8
EPSS
0.0010
EPSS Percentile
26.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (1)
diagon_project/diagon
1.0.139
Published
Jul 05, 2023
Tracked Since
Feb 18, 2026