Vulnerabilities > Justsystems > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-11-26 | CVE-2014-7247 | Data Processing Errors vulnerability in Justsystems Ichitaro and Ichitaro PRO Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote attackers to execute arbitrary code via a crafted file. | 10.0 |
2013-11-13 | CVE-2013-5990 | Remote Code Execution vulnerability in Multiple Ichitaro Products Unspecified vulnerability in JustSystems Ichitaro 2006 through 2011; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen and Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 and Pro 2 Trial Edition; Ichitaro Viewer; and Ichitaro Portable with oreplug allows remote attackers to execute arbitrary code via a crafted document. | 9.3 |
2013-06-18 | CVE-2013-3644 | Remote Code Execution vulnerability in Multiple Ichitaro Products Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JUST School through 2010 allows remote attackers to execute arbitrary code via a crafted document. | 10.0 |
2013-03-01 | CVE-2013-0707 | Arbitrary Code Execution vulnerability in Multiple JustSystems Products Unspecified vulnerability in JustSystems Ichitaro 2006 and 2007, Ichitaro Government 2006 and 2007, Ichitaro Portable with oreplug, Hanako 2006 through 2013, Hanako Police, Hanako Police 3, and Hanako Police 2010 allows remote attackers to execute arbitrary code via a crafted file. | 9.3 |
2012-04-27 | CVE-2012-0269 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Justsystems products Buffer overflow in JustSystems Ichitaro 2011 Sou, Ichitaro 2006 through 2011, Ichitaro Government 2006 through 2010, Ichitaro Portable with oreplug, Ichitaro Viewer, JUST School, JUST School 2009 and 2010, JUST Jump 4, JUST Frontier, oreplug, Shuriken Pro4, Shuriken 2007 through 2010, Shuriken Pro4 Corporate Edition, Shuriken CE/2007 through CE/2009 Corporate Edition, Shuriken 2010 Corporate Edition, Rekishimail Sengokubusho no missho, and Bakumatsushishi no missho allows remote attackers to execute arbitrary code via a crafted image file. | 9.3 |
2011-07-18 | CVE-2011-1331 | Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Justsystems products JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document, as exploited in the wild in early 2011. | 9.3 |
2010-11-06 | CVE-2010-3916 | Remote Code Execution vulnerability in Justsystems Ichitaro 2007/2008/2009 Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3915. | 9.3 |
2010-11-06 | CVE-2010-3915 | Remote Code Execution vulnerability in Justsystems Ichitaro 2007/2008/2009 Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government allows remote attackers to execute arbitrary code via a crafted document, a different vulnerability than CVE-2010-3916. | 9.3 |
2010-06-03 | CVE-2010-2152 | Remote Code Execution vulnerability in Justsystems Ichitaro and Just School Unspecified vulnerability in JustSystems Ichitaro 2004 through 2009, Ichitaro Government 2006 through 2009, and Just School 2008 and 2009 allows remote attackers to execute arbitrary code via unknown vectors related to "product character attribute processing" for a document. | 9.3 |
2010-04-15 | CVE-2010-1424 | Remote Security vulnerability in Ichitaro Unspecified vulnerability in JustSystems Ichitaro and Ichitaro Government 2006 through 2010 allows user-assisted remote attackers to execute arbitrary code via a crafted font file. | 9.3 |