{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T21:51:10.304","vulnerabilities":[{"cve":{"id":"CVE-2023-38127","sourceIdentifier":"talos-cna@cisco.com","published":"2023-10-19T18:15:09.467","lastModified":"2025-11-04T20:16:33.990","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An integer overflow exists in the \"HyperLinkFrame\" stream parser of Ichitaro 2023 1.0.1.59372. A specially crafted document can cause the parser to make an under-sized allocation, which can later allow for memory corruption, potentially resulting in arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability."},{"lang":"es","value":"Existe un desbordamiento de enteros en el analizador de flujo \"HyperLinkFrame\" de Ichitaro 2023 1.0.1.59372. Un documento especialmente manipulado puede hacer que el analizador realice una asignación de tamaño insuficiente, lo que posteriormente puede permitir la corrupción de la memoria, lo que podría provocar la ejecución de código arbitrario. Un atacante puede proporcionar un archivo malicioso para desencadenar esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"talos-cna@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"talos-cna@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-190"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-190"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:easy_postcard_max:-:*:*:*:*:*:*:*","matchCriteriaId":"D68E98B0-38CA-4148-825D-CF7C8AABB5BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_2021:-:*:*:*:*:*:*:*","matchCriteriaId":"1755383C-2B74-4DD7-9C9B-DB19C12CA94D"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_2022:-:*:*:*:*:*:*:*","matchCriteriaId":"1274E0AB-BDE0-45FB-B3A2-522E3AE4E41A"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_2023:1.0.1.59372:*:*:*:*:*:*:*","matchCriteriaId":"15B1DC82-380D-4CF4-AF35-4AF2A1CBF778"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_government_10:-:*:*:*:*:*:*:*","matchCriteriaId":"7A1C403A-6787-4347-AF6F-69F225944011"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_government_8:-:*:*:*:*:*:*:*","matchCriteriaId":"E401B098-6551-4101-9906-19C2AB7A5504"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_government_9:-:*:*:*:*:*:*:*","matchCriteriaId":"65A56D02-7438-4319-BFD1-64FB11BC758C"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_pro_3:-:*:*:*:*:*:*:*","matchCriteriaId":"36AE4633-5418-4009-B51D-4A1F542B1A88"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_pro_4:-:*:*:*:*:*:*:*","matchCriteriaId":"21A4F85C-EA95-4853-9A8C-C3C9142243A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:ichitaro_pro_5:-:*:*:*:*:*:*:*","matchCriteriaId":"76FAE0E6-1037-45AC-A277-8F32338A50AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_government_3:-:*:*:*:*:*:*:*","matchCriteriaId":"552D41EF-A5DB-4ED0-B404-FF2649969B11"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_government_4:-:*:*:*:*:*:*:*","matchCriteriaId":"1F61D3C1-0011-4D78-83F8-2349D46AFE59"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_government_5:-:*:*:*:*:*:*:*","matchCriteriaId":"FC99A5A2-32B0-4F38-A2B1-FAC50A05FBEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_office_3:-:*:*:*:*:*:*:*","matchCriteriaId":"7814DB96-4078-47B8-93B2-5066029B6F65"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_office_4:-:*:*:*:*:*:*:*","matchCriteriaId":"0D8E2A1A-7C06-491F-8A28-BE70EFCDDFFF"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_office_5:-:*:*:*:*:*:*:*","matchCriteriaId":"DD6F3523-7059-4591-9D04-97D287128D6E"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_police_3:-:*:*:*:*:*:*:*","matchCriteriaId":"5ED46089-ED5B-4314-B079-A8932377475E"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_police_4:-:*:*:*:*:*:*:*","matchCriteriaId":"C3B6B97E-B202-4B1F-9B81-367CB7172DEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:justsystems:just_police_5:-:*:*:*:*:*:*:*","matchCriteriaId":"6B5D80C5-5821-416E-A3E3-ADC7F221B093"}]}]}],"references":[{"url":"https://jvn.jp/en/jp/JVN28846531/index.html","source":"talos-cna@cisco.com","tags":["Third Party Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808","source":"talos-cna@cisco.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://jvn.jp/en/jp/JVN28846531/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1808","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1808","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}