Browse all 8 CVE security advisories affecting Iceni. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Iceni is primarily used for PDF manipulation and conversion, enabling users to edit, reformat, and process PDF documents. Historically, it has been associated with multiple vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws. The application's complex parsing of PDF files has frequently led to memory corruption and unsafe deserialization issues. While no major public security incidents have been widely reported, its consistent vulnerability pattern suggests potential risks in environments processing untrusted PDF documents. The eight recorded CVEs highlight ongoing challenges in secure document handling, particularly concerning input validation and memory safety in its processing engine.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2017-2777 | Iceni Argus 缓冲区错误漏洞 — Argus | 7.8 | - | 2018-09-17 |
| CVE-2016-8388 | Iceni Argus 安全漏洞 — Argus | 7.8 | - | 2017-02-28 |
| CVE-2016-8389 | Iceni Argus 数字错误漏洞 — Argus | 7.8 | - | 2017-02-28 |
| CVE-2016-8715 | Iceni Argus 安全漏洞 — Argus | 7.8 | - | 2017-02-28 |
| CVE-2016-8385 | Iceni Argus 缓冲区错误漏洞 — Argus | 7.8 | - | 2017-02-27 |
| CVE-2016-8386 | Iceni Argus 缓冲区错误漏洞 — Argus | 7.8 | - | 2017-02-27 |
| CVE-2016-8387 | Iceni Argus 缓冲区错误漏洞 — Argus | 7.8 | - | 2017-02-27 |
This page lists every published CVE security advisory associated with Iceni. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.