Lucene search

K

Argus Security Vulnerabilities

cve
cve

CVE-2023-25556

A CWE-287: Improper Authentication vulnerability exists that could allow a device to be compromised when a key of less than seven digits is entered and the attacker has access to the KNX...

8.8CVSS

8.5AI Score

0.001EPSS

2023-04-18 06:15 PM
18
2
cve
cve

CVE-2021-2040

Vulnerability in the Oracle Argus Safety product of Oracle Health Sciences Applications (component: Case Form, Local Affiliate Form). The supported version that is affected is 8.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle.....

6.1CVSS

5.8AI Score

0.001EPSS

2021-01-20 03:15 PM
27
cve
cve

CVE-2021-2110

Vulnerability in the Oracle Argus Safety product of Oracle Health Sciences Applications (component: Letters). The supported version that is affected is 8.2.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety. While the...

5CVSS

4.7AI Score

0.001EPSS

2021-01-20 03:15 PM
27
cve
cve

CVE-2019-2432

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Login). Supported versions that are affected are 8.1 and 8.2. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety....

4.9CVSS

5.7AI Score

0.001EPSS

2019-01-16 07:30 PM
22
cve
cve

CVE-2019-2431

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Console). Supported versions that are affected are 8.1 and 8.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Argus...

6.1CVSS

6.5AI Score

0.001EPSS

2019-01-16 07:30 PM
21
cve
cve

CVE-2019-2430

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Console). Supported versions that are affected are 8.1 and 8.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus Safety....

6.5CVSS

6.7AI Score

0.001EPSS

2019-01-16 07:30 PM
19
cve
cve

CVE-2017-2777

An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this...

7.8CVSS

7.7AI Score

0.001EPSS

2018-09-17 05:29 PM
30
cve
cve

CVE-2018-2643

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Case Selection). Supported versions that are affected are 7.x and 8.0.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus.....

6.4CVSS

6.1AI Score

0.001EPSS

2018-01-18 02:29 AM
19
cve
cve

CVE-2018-2613

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Login). Supported versions that are affected are 7.x, 8.0.x and 8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Argus...

8.2CVSS

7.4AI Score

0.001EPSS

2018-01-18 02:29 AM
20
cve
cve

CVE-2018-2642

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: File Upload). Supported versions that are affected are 7.x and 8.0.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Argus...

6.5CVSS

6.5AI Score

0.001EPSS

2018-01-18 02:29 AM
26
cve
cve

CVE-2018-2644

Vulnerability in the Oracle Argus Safety component of Oracle Health Sciences Applications (subcomponent: Worklist). Supported versions that are affected are 7.x, 8.0.x and 8.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Argus.....

6.1CVSS

6.2AI Score

0.001EPSS

2018-01-18 02:29 AM
18
cve
cve

CVE-2016-8388

An exploitable arbitrary heap-overwrite vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will explicitly trust an index within the specific font object and use it to write the font's name to a single object within an array of...

7.8CVSS

7.6AI Score

0.001EPSS

2017-02-28 03:59 PM
26
cve
cve

CVE-2016-8715

An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05. A specially crafted PDF file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide a malicious PDF file to trigger this...

7.8CVSS

8AI Score

0.001EPSS

2017-02-28 03:59 PM
31
cve
cve

CVE-2016-8389

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. As the application attempts to iterate through the rows and.....

7.8CVSS

7.7AI Score

0.001EPSS

2017-02-28 03:59 PM
28
cve
cve

CVE-2016-8387

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code...

7.8CVSS

7.9AI Score

0.001EPSS

2017-02-27 09:59 PM
30
cve
cve

CVE-2016-8386

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a signedness issue, a buffer smaller than the...

7.8CVSS

7.9AI Score

0.002EPSS

2017-02-27 09:59 PM
27
cve
cve

CVE-2016-8385

An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In...

7.8CVSS

8AI Score

0.002EPSS

2017-02-27 09:59 PM
29
cve
cve

CVE-2016-8335

An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of Iceni Argus Version 6.6.04 (Sep 7 2012) NK - Linux x64 and Version 6.6.04 (Nov 14 2014) NK - Windows x64. A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code...

7.8CVSS

8AI Score

0.001EPSS

2016-10-28 08:59 PM
32
4
cve
cve

CVE-2016-8333

An exploitable stack-based buffer overflow vulnerability exists in the ipfSetColourStroke functionality of Iceni Argus version 6.6.04 A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can provide a malicious pdf file to trigger this...

7.8CVSS

8AI Score

0.001EPSS

2016-10-28 08:59 PM
24
4
cve
cve

CVE-2011-3332

Stack-based buffer overflow in Iceni Argus 6.20 and earlier and Infix 5.04 allows remote attackers to execute arbitrary code via a crafted PDF document that uses flate...

8.2AI Score

0.099EPSS

2011-10-06 11:55 PM
21