19 results (0.002 seconds)

CVSS: 10.0EPSS: 6%CPEs: 16EXPL: 0

26 Nov 2014 — Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file. Vulnerabilidad no especificada en JustSystems Ichitaro 2008 hasta 2011; Ichitaro Government 6, 7, 2008, 2009, y 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; y Ichit... • http://jvn.jp/en/jp/JVN16318793/index.html • CWE-19: Data Processing Errors •

CVSS: 9.8EPSS: 6%CPEs: 24EXPL: 0

16 Jun 2014 — JustSystems JUST Online Update, as used in Ichitaro through 2014 and other products, does not properly validate signatures of update modules, which allows remote attackers to spoof modules and execute arbitrary code via a crafted signature. JustSystems JUST Online Update, utilizado en Ichitaro hasta 2014 y otros productos, no valida debidamente firmas de módulos de actualización, lo que permite a atacantes remotos falsificar módulos y ejecutar código arbitrario a través de una firma manipulada. • http://jvn.jp/en/jp/JVN50129191/index.html • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 5%CPEs: 22EXPL: 0

13 Nov 2013 — Unspecified vulnerability in JustSystems Ichitaro 2006 through 2011; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen and Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 and Pro 2 Trial Edition; Ichitaro Viewer; and Ichitaro Portable with oreplug allows remote attackers to execute arbitrary code via a crafted document. Vulnerabilidad no especificada en JustSystems Ichitaro hasta la versión 2011; Ichitaro Government 6, 7, y 2006 hasta la versión 2010; ... • http://jvn.jp/en/jp/JVN44999463/index.html •

CVSS: 10.0EPSS: 10%CPEs: 18EXPL: 0

18 Jun 2013 — Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JUST School through 2010 allows remote attackers to execute arbitrary code via a crafted document. Vulnerabilidad sin especificar en JustSystems Ichitaro 2006 a la 2013; Ichitaro Pro a la 2; Ichitaro Government 6, 7, y 2006 a la 2010; Ichitaro Portable con oreplug; Ichitaro Viewer; y Ichitaro JUST School a ... • http://jvn.jp/en/jp/JVN98712361/index.html •

CVSS: 9.3EPSS: 4%CPEs: 16EXPL: 0

01 Mar 2013 — Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file. Vulnerabilidad sin especificar en JustSystems Ichitaro v2006 y 2007, el Gobierno Ichitaro 2006 y 2007, Ichitaro portátil con oreplug, Hanako 2006 hasta 2013, Hanako Policía, Policía Hanako 3 y Hanako Police 2010 permite a atacant... • http://jvn.jp/en/jp/JVN16817324/index.html •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 0

27 Apr 2012 — Untrusted search path vulnerability in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, and oreplug allows local users to gain privileges via a Trojan horse DLL in the current working directory. Vulnerabilidad de busqueda de ruta no comprobada en JustSystems Ichitaro v2011 Sou, Ichitaro v2006 hasta v2011, Ichitaro Government v2006 hasta v2010, ... • http://jvn.jp/en/jp/JVN95378720/index.html •

CVSS: 9.3EPSS: 10%CPEs: 32EXPL: 0

27 Apr 2012 — Buffer overflow in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, oreplug, Shuriken Pro4, Shuriken 2007 through 2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 through CE/2009 Corporate Edition, Shuriken 2010 Corporate Edition, Rekishimail Sengokubusho no missho, and Bakumatsushishi no missho allows remote attackers to execute arbitra... • http://jvn.jp/en/jp/JVN09619876/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 2%CPEs: 21EXPL: 1

18 Jul 2011 — JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011. JustSystems Ichitaro v2005 hasta v2011, Ichitaro Government v6, Ichitaro Gobierno de v2006 a v2010, Ichitaro portátil, Ichitaro Pro, y el Visor de Ichitaro permite a atacantes remotos ejecut... • http://jvn.jp/en/jp/JVN87239473/index.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.8EPSS: 15%CPEs: 12EXPL: 0

03 Jun 2010 — Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors related to "product character attribute processing" for a document. Vulnerabilidad sin expecificar de JustSystems Ichitaro 2004 hasta 2009, Ichitaro Government 2006 hasta 2009, y Just School 2008 y 2009 permite a atacantes remotos ejecutar código arbitrario a través de vectores desconocidos relacionado ... • http://jvn.jp/en/jp/JVN17293765/index.html •

CVSS: 9.3EPSS: 4%CPEs: 11EXPL: 0

15 Apr 2010 — Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government 2006 through 2010 allows user-assisted remote attackers to execute arbitrary code via a crafted font file. Vulnerabilidad no especificada en JustSystems Ichitaro y Ichitaro Government v2006 hasta v2010 permite a atacantes asistidos por usuarios remotamente ejecutar código de su elección a través de un fichero de fuentes modificado. • http://jvn.jp/en/jp/JVN98467259/index.html •