漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
WinSig.exe in eSignal 10.6.2425 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a long StyleTemplate element in a QUO, SUM or POR file, which triggers a stack-based buffer overflow, or (2) a long Font->FaceName field (aka FaceName element), which triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.
漏洞信息
N/A
漏洞
N/A
漏洞
Interactivedata eSignal WinSig.exe缓冲区溢出漏洞
漏洞信息
eSignal是一款外汇交易平台,提供各种市场数据。 eSignal 10.6.2425及其早期版本的WinSig.exe中存在缓冲区溢出漏洞。远程攻击者可借助QUO,SUM或POR文件中的超长StyleTemplate元素执行任意代码,触发基于栈的缓冲区溢出,或借助超长Font->FaceName字段(FaceName元素)执行任意代码,触发基于堆的缓冲区溢出。
漏洞信息
N/A
漏洞
N/A