Lucene search

K

Argus Security Vulnerabilities

cve
cve

CVE-2011-3332

Stack-based buffer overflow in Iceni Argus 6.20 and earlier and Infix 5.04 allows remote attackers to execute arbitrary code via a crafted PDF document that uses flate compression.

8.3AI Score

0.099EPSS

2011-10-06 11:55 PM
21
cve
cve

CVE-2016-8333

An exploitable stack-based buffer overflow vulnerability exists in the ipfSetColourStroke functionality of Iceni Argus version 6.6.04 A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can provide a malicious pdf file to trigger this vulnerab...

8.8CVSS

8AI Score

0.001EPSS

2016-10-28 08:59 PM
24
4
cve
cve

CVE-2016-8335

An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of Iceni Argus Version 6.6.04 (Sep 7 2012) NK - Linux x64 and Version 6.6.04 (Nov 14 2014) NK - Windows x64. A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution....

8.8CVSS

8AI Score

0.001EPSS

2016-10-28 08:59 PM
34
4
cve
cve

CVE-2016-8385

An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In most...

7.8CVSS

7.9AI Score

0.002EPSS

2017-02-27 09:59 PM
29
cve
cve

CVE-2016-8386

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a signedness issue, a buffer smaller than the reque...

7.8CVSS

7.9AI Score

0.002EPSS

2017-02-27 09:59 PM
27
cve
cve

CVE-2016-8387

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execu...

7.8CVSS

7.9AI Score

0.001EPSS

2017-02-27 09:59 PM
30
cve
cve

CVE-2016-8388

An exploitable arbitrary heap-overwrite vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will explicitly trust an index within the specific font object and use it to write the font's name to a single object within an array of objects.

7.8CVSS

7.6AI Score

0.001EPSS

2017-02-28 03:59 PM
26
cve
cve

CVE-2016-8389

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. As the application attempts to iterate through the rows and i...

7.8CVSS

7.8AI Score

0.001EPSS

2017-02-28 03:59 PM
28
cve
cve

CVE-2016-8715

An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05. A specially crafted PDF file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide a malicious PDF file to trigger this vulnerability.

7.8CVSS

8AI Score

0.001EPSS

2017-02-28 03:59 PM
31
cve
cve

CVE-2017-2777

An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this vulnerability.

8.8CVSS

7.6AI Score

0.001EPSS

2018-09-17 05:29 PM
30