{"id":"CVE-2023-27390","details":"A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability.","modified":"2026-04-12T06:37:23.195624Z","published":"2023-07-05T16:15:09.507Z","references":[{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/arthursonzogni/diagon","events":[{"introduced":"0"},{"last_affected":"a74933801a1b559f751a5654f91e37f380f9dfff"}],"database_specific":{"cpe":"cpe:2.3:a:diagon_project:diagon:1.0.139:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.0.139"}]}}],"versions":["v1.0.124","v1.0.127","v1.0.139"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-27390.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}