CVE-2017-10870
https://notcve.org/view.php?id=CVE-2017-10870
Memory corruption vulnerability in Rakuraku Hagaki (Rakuraku Hagaki 2018, Rakuraku Hagaki 2017, Rakuraku Hagaki 2016) and Rakuraku Hagaki Select for Ichitaro (Ichitaro 2017, Ichitaro 2016, Ichitaro 2015, Ichitaro Pro3, Ichitaro Pro2, Ichitaro Pro, Ichitaro 2011, Ichitaro Government 8, Ichitaro Government 7, Ichitaro Government 6 and Ichitaro 2017 Trial version) allows attackers to execute arbitrary code with privileges of the application via specially crafted file. Una vulnerabilidad de corrupción de memoria en Rakuraku Hagaki (Rakuraku Hagaki 2018, Rakuraku Hagaki 2017, Rakuraku Hagaki 2016) y Rakuraku Hagaki Select para Ichitaro (Ichitaro 2017, Ichitaro 2016, Ichitaro 2015, Ichitaro Pro3, Ichitaro Pro2, Ichitaro Pro, Ichitaro 2011, Ichitaro Government 8, Ichitaro Government 7, Ichitaro Government 6 e Ichitaro 2017 Trial version) permite que atacantes ejecuten código arbitrario con privilegios de la aplicación mediante archivos especialmente manipulados. • https://jvn.jp/en/vu/JVNVU93703434/index.html https://www.justsystems.com/jp/info/js17003.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2014-7247
https://notcve.org/view.php?id=CVE-2014-7247
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file. Vulnerabilidad no especificada en JustSystems Ichitaro 2008 hasta 2011; Ichitaro Government 6, 7, 2008, 2009, y 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; y Ichitaro 2014 Tetsu permite a atacantes remotos ejecutar código arbitrario a través de un fichero manipulado. • http://jvn.jp/en/jp/JVN16318793/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000131 http://www.justsystems.com/jp/info/js14003.html • CWE-19: Data Processing Errors •
CVE-2013-5990
https://notcve.org/view.php?id=CVE-2013-5990
Unspecified vulnerability in JustSystems Ichitaro 2006 through 2011; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen and Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 and Pro 2 Trial Edition; Ichitaro Viewer; and Ichitaro Portable with oreplug allows remote attackers to execute arbitrary code via a crafted document. Vulnerabilidad no especificada en JustSystems Ichitaro hasta la versión 2011; Ichitaro Government 6, 7, y 2006 hasta la versión 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen y Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 y Pro 2 Trial Edition; Ichitaro Viewer; e Ichitaro Portable con oreplug permite a atacantes remotos ejecutar código arbitrario a través de un documento manipulado. • http://jvn.jp/en/jp/JVN44999463/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2013-000103 http://www.justsystems.com/jp/info/js13003.html •
CVE-2012-0269
https://notcve.org/view.php?id=CVE-2012-0269
Buffer overflow in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, oreplug, Shuriken Pro4, Shuriken 2007 through 2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 through CE/2009 Corporate Edition, Shuriken 2010 Corporate Edition, Rekishimail Sengokubusho no missho, and Bakumatsushishi no missho allows remote attackers to execute arbitrary code via a crafted image file. Desbordamiento de buffer en JustSystems Ichitaro v2011 Sou, Ichitaro v2006 hasta v2011, Ichitaro Government v2006 hasta v2010, Ichitaro Portable con oreplug, Ichitaro Viewer, únicamente School, únicamente School v2009 y v2010, únicamente Jump v4, únicamente Frontier, oreplug, Shuriken Pro4, Shuriken v2007 hasta v2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 hasta CE/2009 Corporate Edition, Shuriken v2010 Corporate Edition, Rekishimail Sengokubusho no missho, y Bakumatsushishi no missho que permite a atacantes remotos ejecutar código de su elección mediante un fichero de imagen modificado. • http://jvn.jp/en/jp/JVN09619876/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000035 http://www.justsystems.com/jp/info/js12001.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-1331
https://notcve.org/view.php?id=CVE-2011-1331
JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011. JustSystems Ichitaro v2005 hasta v2011, Ichitaro Government v6, Ichitaro Gobierno de v2006 a v2010, Ichitaro portátil, Ichitaro Pro, y el Visor de Ichitaro permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria heap ) a través de un documento manipulado, como se exploto a principios de 2011. • http://jvn.jp/en/jp/JVN87239473/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2011-000043 http://secunia.com/advisories/44956 http://www.justsystems.com/jp/info/js11001.html http://www.securityfocus.com/bid/48283 http://www.symantec.com/connect/blogs/targeted-attacks-2011-using-ichitaro-zero-day-vulnerability https://exchange.xforce.ibmcloud.com/vulnerabilities/68072 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •