8 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 1

A use-after-free vulnerability exists in the Figure stream parsing functionality of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause memory corruption, resulting in arbitrary code execution. Victim would need to open a malicious file to trigger this vulnerability. Existe una vulnerabilidad de use-after-free en la funcionalidad de análisis de flujo de figuras de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede causar daños en la memoria, lo que resulta en la ejecución de código arbitrario. • https://jvn.jp/en/jp/JVN28846531/index.html https://talosintelligence.com/vulnerability_reports/TALOS-2023-1758 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 1

An integer overflow exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. Existe un desbordamiento de enteros en el analizador de flujo "HyperLinkFrame" de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede hacer que el analizador realice una asignación de tamaño insuficiente, lo que posteriormente puede permitir la corrupción de la memoria, lo que podría provocar la ejecución de código arbitrario. • https://jvn.jp/en/jp/JVN28846531/index.html https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808 • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 2

An out-of-bounds write vulnerability exists in the "HyperLinkFrame" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause a type confusion, which can lead to memory corruption and eventually arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. Existe una vulnerabilidad de escritura fuera de límites en el analizador de flujo "HyperLinkFrame" de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede causar confusión de tipos, lo que puede provocar daños en la memoria y, finalmente, la ejecución de código arbitrario. • https://jvn.jp/en/jp/JVN28846531/index.html https://talosintelligence.com/vulnerability_reports/TALOS-2023-1809 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1809 • CWE-787: Out-of-bounds Write CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.8EPSS: 0%CPEs: 19EXPL: 2

An out-of-bounds write vulnerability exists within the parsers for both the "DocumentViewStyles" and "DocumentEditStyles" streams of Ichitaro 2023 1.0.1.59372 when processing types 0x0000-0x0009 of a style record with the type 0x2008. A specially crafted document can cause memory corruption, which can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability. Existe una vulnerabilidad de escritura fuera de límites dentro de los analizadores para las secuencias "DocumentViewStyles" y "DocumentEditStyles" de Ichitaro 2023 1.0.1.59372 al procesar los tipos 0x0000-0x0009 de un registro de estilo con el tipo 0x2008. Un documento especialmente manipulado puede provocar daños en la memoria, lo que puede provocar la ejecución de código arbitrario. • https://jvn.jp/en/jp/JVN28846531/index.html https://talosintelligence.com/vulnerability_reports/TALOS-2023-1825 https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1825 • CWE-129: Improper Validation of Array Index CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

A use-after-free vulnerability exists within the way Ichitaro Word Processor 2022, version 1.0.1.57600, processes protected documents. A specially crafted document can trigger reuse of freed memory, which can lead to further memory corruption and potentially result in arbitrary code execution. An attacker can provide a malicious document to trigger this vulnerability. • https://jvn.jp/en/jp/JVN79149117 https://talosintelligence.com/vulnerability_reports/TALOS-2022-1673 • CWE-416: Use After Free •