Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2011-3494

EPSS 77.85% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2011-3494

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Interactivedata eSignal WinSig.exe缓冲区溢出漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
eSignal是一款外汇交易平台,提供各种市场数据。 eSignal 10.6.2425及其早期版本的WinSig.exe中存在缓冲区溢出漏洞。远程攻击者可借助QUO,SUM或POR文件中的超长StyleTemplate元素执行任意代码,触发基于栈的缓冲区溢出,或借助超长Font->FaceName字段(FaceName元素)执行任意代码,触发基于堆的缓冲区溢出。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2011-3494

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2011-3494

登录查看更多情报信息。

Same Patch Batch · n/a · 2011-09-16 · 18 CVEs total

CVE-2011-3503Interactivedata eSignal不可信搜索路径漏洞
CVE-2011-3493Cogent DataHub多个栈缓冲区溢出漏洞
CVE-2011-3492Azeotech DAQFactory栈缓冲区溢出漏洞
CVE-2011-3491Progea Movicon/PowerHMI堆缓冲区溢出漏洞
CVE-2011-3490Measuresoft ScadaPro service.exe多个栈缓冲区溢出漏洞
CVE-2011-3489Rockwell Automation RSLogix RsvcHost.exe RnaUtility.dll缓冲区溢出漏洞
CVE-2011-3488Equis MetaStock释放后使用漏洞
CVE-2011-3487Carel PlantVisor CarelDataServer.exe目录遍历漏洞
CVE-2011-3486Beckhoff TwinCAT缓冲区溢出漏洞
CVE-2011-3495Measuresoft ScadaPro service.exe多个目录遍历漏洞
CVE-2011-3502Cogent DataHub web服务器信息泄露漏洞
CVE-2011-3501Cogent DataHub整数溢出漏洞
CVE-2011-3500Cogent DataHub目录遍历漏洞
CVE-2011-3499Progea Movicon/PowerHMI缓冲区溢出漏洞
CVE-2011-3498Progea Movicon/PowerHMI堆缓冲区溢出漏洞
CVE-2011-3497Measuresoft ScadaPro service.exe信息泄露漏洞
CVE-2011-3496Measuresoft ScadaPro service.exe输入验证漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2011-3494

No comments yet


Leave a comment