Iceni

Argus

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.26%
  • Veröffentlicht 17.09.2018 17:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:08

An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this vulnerabi...

Exploit
  • EPSS 0.13%
  • Veröffentlicht 28.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable arbitrary heap-overwrite vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will explicitly trust an index within the specific font object and use it to write the font's name to a single obj...

Exploit
  • EPSS 0.17%
  • Veröffentlicht 28.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. As the appli...

  • EPSS 0.39%
  • Veröffentlicht 28.02.2017 15:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05. A specially crafted PDF file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide a malicio...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 27.02.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 27.02.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a ...

  • EPSS 0.28%
  • Veröffentlicht 27.02.2017 21:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checkin...

Exploit
  • EPSS 1.06%
  • Veröffentlicht 28.10.2016 20:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of Iceni Argus Version 6.6.04 (Sep 7 2012) NK - Linux x64 and Version 6.6.04 (Nov 14 2014) NK - Windows x64. A specially crafted pdf file can cause a buffe...

Exploit
  • EPSS 1.06%
  • Veröffentlicht 28.10.2016 20:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

An exploitable stack-based buffer overflow vulnerability exists in the ipfSetColourStroke functionality of Iceni Argus version 6.6.04 A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can prov...

  • EPSS 22.21%
  • Veröffentlicht 06.10.2011 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Stack-based buffer overflow in Iceni Argus 6.20 and earlier and Infix 5.04 allows remote attackers to execute arbitrary code via a crafted PDF document that uses flate compression.