iceni CVE Vulnerabilities & Metrics

Focus on iceni vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About iceni Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with iceni. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total iceni CVEs: 10
Earliest CVE date: 06 Oct 2011, 23:55 UTC
Latest CVE date: 17 Sep 2018, 17:29 UTC

Latest CVE reference: CVE-2017-2777

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical iceni CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 8.23

Max CVSS: 10.0

Critical CVEs (≥9): 6

CVSS Range vs. Count

Range Count
0.0-3.9 0
4.0-6.9 5
7.0-8.9 0
9.0-10.0 6

CVSS Distribution Chart

Top 5 Highest CVSS iceni CVEs

These are the five CVEs with the highest CVSS scores for iceni, sorted by severity first and recency.

All CVEs for iceni

CVE-2017-2777 iceni vulnerability CVSS: 6.8 17 Sep 2018, 17:29 UTC

An exploitable heap overflow vulnerability exists in the ipStringCreate function of Iceni Argus Version 6.6.05. A specially crafted pdf file can cause an integer overflow resulting in heap overflow. An attacker can send file to trigger this vulnerability.

CVE-2017-2863 iceni vulnerability CVSS: 6.8 12 Jul 2017, 17:29 UTC

An out-of-bounds write vulnerability exists in the PDF parsing functionality of Infix 7.1.5. A specially crafted PDF file can cause a vulnerability resulting in potential memory corruption. An attacker can send the victim a specific PDF file to trigger this vulnerability.

CVE-2016-8715 iceni vulnerability CVSS: 6.8 28 Feb 2017, 15:59 UTC

An exploitable heap corruption vulnerability exists in the loadTrailer functionality of Iceni Argus version 6.6.05. A specially crafted PDF file can cause a heap corruption resulting in arbitrary code execution. An attacker can send/provide a malicious PDF file to trigger this vulnerability.

CVE-2016-8389 iceni vulnerability CVSS: 9.3 28 Feb 2017, 15:59 UTC

An exploitable integer-overflow vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will attempt to convert each character from a font into a polygon and then attempt to rasterize these shapes. As the application attempts to iterate through the rows and initializing the polygon shape in the buffer, it will write outside of the bounds of said buffer. This can lead to code execution under the context of the account running it.

CVE-2016-8388 iceni vulnerability CVSS: 9.3 28 Feb 2017, 15:59 UTC

An exploitable arbitrary heap-overwrite vulnerability exists within Iceni Argus. When it attempts to convert a malformed PDF to XML, it will explicitly trust an index within the specific font object and use it to write the font's name to a single object within an array of objects.

CVE-2016-8387 iceni vulnerability CVSS: 9.3 27 Feb 2017, 21:59 UTC

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF with an object encoded w/ multiple encoding types terminating with an LZW encoded type, an overflow may occur due to a lack of bounds checking by the LZW decoder. This can lead to code execution under the context of the account of the user running it.

CVE-2016-8386 iceni vulnerability CVSS: 9.3 27 Feb 2017, 21:59 UTC

An exploitable heap-based buffer overflow exists in Iceni Argus. When it attempts to convert a PDF containing a malformed font to XML, the tool will attempt to use a size out of the font to search through a linked list of buffers to return. Due to a signedness issue, a buffer smaller than the requested size will be returned. Later when the tool tries to populate this buffer, the overflow will occur which can lead to code execution under the context of the user running the tool.

CVE-2016-8385 iceni vulnerability CVSS: 9.3 27 Feb 2017, 21:59 UTC

An exploitable uninitialized variable vulnerability which leads to a stack-based buffer overflow exists in Iceni Argus. When it attempts to convert a malformed PDF to XML a stack variable will be left uninitialized which will later be used to fetch a length that is used in a copy operation. In most cases this will allow an aggressor to write outside the bounds of a stack buffer which is used to contain colors. This can lead to code execution under the context of the account running the tool.

CVE-2016-8335 iceni vulnerability CVSS: 6.8 28 Oct 2016, 20:59 UTC

An exploitable stack based buffer overflow vulnerability exists in the ipNameAdd functionality of Iceni Argus Version 6.6.04 (Sep 7 2012) NK - Linux x64 and Version 6.6.04 (Nov 14 2014) NK - Windows x64. A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can send/provide malicious pdf file to trigger this vulnerability.

CVE-2016-8333 iceni vulnerability CVSS: 6.8 28 Oct 2016, 20:59 UTC

An exploitable stack-based buffer overflow vulnerability exists in the ipfSetColourStroke functionality of Iceni Argus version 6.6.04 A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can provide a malicious pdf file to trigger this vulnerability.

CVE-2011-3332 iceni vulnerability CVSS: 10.0 06 Oct 2011, 23:55 UTC

Stack-based buffer overflow in Iceni Argus 6.20 and earlier and Infix 5.04 allows remote attackers to execute arbitrary code via a crafted PDF document that uses flate compression.