Page 2 of 6 results (0.001 seconds)

CVSS: 9.3EPSS: 4%CPEs: 21EXPL: 1

JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011. JustSystems Ichitaro v2005 hasta v2011, Ichitaro Government v6, Ichitaro Gobierno de v2006 a v2010, Ichitaro portátil, Ichitaro Pro, y el Visor de Ichitaro permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria heap ) a través de un documento manipulado, como se exploto a principios de 2011. • http://jvn.jp/en/jp/JVN87239473/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2011-000043 http://secunia.com/advisories/44956 http://www.justsystems.com/jp/info/js11001.html http://www.securityfocus.com/bid/48283 http://www.symantec.com/connect/blogs/targeted-attacks-2011-using-ichitaro-zero-day-vulnerability https://exchange.xforce.ibmcloud.com/vulnerabilities/68072 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •