Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ichitaro vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2009-1054
Unspecified vulnerability in JustSystems Ichitaro 13, 2004 through 2008, Lite2, and Ichitaro viewer 5.1.5.0 and previous versions allows remote malicious users to execute arbitrary code via a crafted file, as exploited in the wild by Trojan.Tarodrop.H in March 2009.
Ichitaro Ichitaro Viewer
Ichitaro Ichitaro 2007
Ichitaro Ichitaro 2004
Ichitaro Ichitaro 2008
Ichitaro Ichitaro Lite2
Ichitaro Ichitaro 13
Ichitaro Ichitaro 2005
Ichitaro Ichitaro 2006
NA
CVE-2007-1938
Ichitaro 2005 through 2007, and possibly related products, allows remote malicious users to have an unknown impact via unspecified vectors in a document distributed through e-mail or a web site, possibly due to a buffer overflow or cross-site scripting (XSS).
Ichitaro Ichitaro 2005
Ichitaro Ichitaro 2006
Ichitaro Ichitaro 2007
NA
CVE-2013-3644
Unspecified vulnerability in JustSystems Ichitaro 2006 through 2013; Ichitaro Pro through 2; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro Portable with oreplug; Ichitaro Viewer; and Ichitaro JUST School through 2010 allows remote malicious users to execute arbitrary ...
Justsystems Ichitaro 2006
Justsystems Ichitaro 2007
Justsystems Ichitaro Portable -
Justsystems Ichitaro Viewer -
Justsystems Ichitaro Just School -
Justsystems Ichitaro 2008
Justsystems Ichitaro 2010
Justsystems Ichitaro 2009
Justsystems Ichitaro 2012
Justsystems Ichitaro 2013
Justsystems Ichitaro 6
Justsystems Ichitaro 7
Justsystems Ichitaro 2011
NA
CVE-2013-5990
Unspecified vulnerability in JustSystems Ichitaro 2006 through 2011; Ichitaro Government 6, 7, and 2006 through 2010; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen and Gen Trial Edition; Ichitaro Pro; Ichitaro Pro 2 and Pro 2 Trial Edition; Ichitaro Viewer; and Ichitar...
Justsystems Ichitaro Pro 2
Justsystems Ichitaro Pro -
Justsystems Ichitaro Portable With Oreplug -
Justsystems Ichitaro 2012
Justsystems Ichitaro 2013
Justsystems Ichitaro Viewer -
Justsystems Ichitaro 2011
Justsystems Ichitaro 2006
Justsystems Ichitaro 2008
Justsystems Ichitaro 2009
Justsystems Ichitaro 2010
Justsystems Ichitaro 6
Justsystems Ichitaro 7
Justsystems Ichitaro 2007
NA
CVE-2014-2003
JustSystems JUST Online Update, as used in Ichitaro through 2014 and other products, does not properly validate signatures of update modules, which allows remote malicious users to spoof modules and execute arbitrary code via a crafted signature.
Justsystems Ichitaro
Justsystems Ichitaro 10
Justsystems Ichitaro 11
Justsystems Ichitaro 2009
Justsystems Ichitaro 2010
Justsystems Ichitaro 2011
Justsystems Ichitaro 2006
Justsystems Ichitaro 2007
Justsystems Ichitaro 12
Justsystems Ichitaro 2004
Justsystems Ichitaro 2008
Justsystems Ichitaro 2013
Justsystems Just Online Update -
Justsystems Ichitaro 13
Justsystems Ichitaro 2005
Justsystems Ichitaro 2012
NA
CVE-2011-1331
JustSystems Ichitaro 2005 through 2011, Ichitaro Government 6, Ichitaro Government 2006 through 2010, Ichitaro Portable, Ichitaro Pro, and Ichitaro Viewer allow remote malicious users to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted do...
Justsystems Ichitaro 2005
Justsystems Ichitaro 2006
Justsystems Ichitaro 2007
Justsystems Ichitaro 2008
Justsystems Ichitaro Viewer 19.0.2.0
Justsystems Ichitaro Viewer 19.0.3.0
Justsystems Ichitaro 2009
Justsystems Ichitaro 2010
Justsystems Ichitaro Viewer
Justsystems Ichitaro Portable
Justsystems Ichitaro 6
Justsystems Ichitaro Viewer 20.0.2.0
Justsystems Ichitaro Viewer 5.1.3.0
Justsystems Ichitaro 2011
Justsystems Ichitaro Pro
Justsystems Ichitaro Viewer 19.0.1.0
NA
CVE-2008-0223
Buffer overflow in JustSystems JSFC.DLL, as used in multiple JustSystems products such as Ichitaro, allows remote malicious users to execute arbitrary code via a crafted .JTD file.
Justsystem Ichitaro 2005
Justsystem Ichitaro 2006
Justsystem Ichitaro 11.0
Justsystem Ichitaro 12.0
Justsystem Ichitaro Lite2
Justsystem Ichitaro Viewer
Justsystem Ichitaro 13.0
Justsystem Ichitaro 2004
Justsystem Ichitaro 2007
Justsystem Ichitaro Linux
NA
CVE-2014-7247
Unspecified vulnerability in JustSystems Ichitaro 2008 through 2011; Ichitaro Government 6, 7, 2008, 2009, and 2010; Ichitaro Pro; Ichitaro Pro 2; Ichitaro 2011 Sou; Ichitaro 2012 Shou; Ichitaro 2013 Gen; and Ichitaro 2014 Tetsu allows remote malicious users to execute arbitrary ...
Justsystems Ichitaro 2014
Justsystems Ichitaro Pro 2
Justsystems Ichitaro Pro -
Justsystems Ichitaro 7
Justsystems Ichitaro 6
Justsystems Ichitaro 2008
Justsystems Ichitaro 2009
Justsystems Ichitaro 2010
Justsystems Ichitaro 2012
Justsystems Ichitaro 2011
Justsystems Ichitaro 2013
NA
CVE-2009-4737
Stack-based buffer overflow in JustSystems Corporation Ichitaro 13, 2004 through 2009, Viewer 2009 19.0.1.0 and previous versions, and other versions allows context-dependent malicious users to execute arbitrary code via a crafted Rich Text File (RTF), related to "pvpara ffo...
Justsystems Ichitaro 2009
Justsystems Ichitaro 2006
Justsystems Ichitaro 2005
Justsystems Ichitaro 2008
Justsystems Ichitaro 13
Justsystems Ichitaro Viewer 19.0.1.0
Justsystems Ichitaro Bungei
Justsystems Ichitaro 2004
Justsystems Ichitaro 2007
Justsystems Ichitaro Viewer 20.0.2.0
NA
CVE-2007-5687
Multiple buffer overflows in the rich text processing functionality in JustSystems Ichitaro 2004 through 2007, 11 through 13, and other versions allow remote malicious users to execute arbitrary code via a long (1) pard field or (2) font name in the fcharset0 field, which is not ...
Justsystem Ichitaro Linux
Justsystem Ichitaro Lite2
Justsystem Ichitaro 11.0
Justsystem Ichitaro 12.0
Justsystem Ichitaro 2005
Justsystem Ichitaro 2006
Justsystem Ichitaro 13.0
Justsystem Ichitaro 2004
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
NEXT »