Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2011-2089
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-13 May, 2011 | 17:05
Updated At-29 Apr, 2026 | 01:13

Stack-based buffer overflow in the SetActiveXGUID method in the VersionInfo ActiveX control in GenVersion.dll 8.0.138.0 in the WebHMI subsystem in ICONICS BizViz 9.x before 9.22 and GENESIS32 9.x before 9.22 allows remote attackers to execute arbitrary code via a long string in the argument. NOTE: some of these details are obtained from third party information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 9.3
Base severity: HIGH
Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

iconics
iconics
>>bizviz>>9.0
cpe:2.3:a:iconics:bizviz:9.0:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.01
cpe:2.3:a:iconics:bizviz:9.01:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.1
cpe:2.3:a:iconics:bizviz:9.1:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.2
cpe:2.3:a:iconics:bizviz:9.2:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.13
cpe:2.3:a:iconics:bizviz:9.13:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.20
cpe:2.3:a:iconics:bizviz:9.20:*:*:*:*:*:*:*
iconics
iconics
>>bizviz>>9.21
cpe:2.3:a:iconics:bizviz:9.21:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.0
cpe:2.3:a:iconics:genesis32:9.0:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.1
cpe:2.3:a:iconics:genesis32:9.1:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.01
cpe:2.3:a:iconics:genesis32:9.01:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.2
cpe:2.3:a:iconics:genesis32:9.2:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.13
cpe:2.3:a:iconics:genesis32:9.13:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.20
cpe:2.3:a:iconics:genesis32:9.20:*:*:*:*:*:*:*
iconics
iconics
>>genesis32>>9.21
cpe:2.3:a:iconics:genesis32:9.21:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
CWE ID: CWE-119
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://secunia.com/advisories/44417cve@mitre.org
Vendor Advisory
http://www.exploit-db.com/exploits/17240cve@mitre.org
Exploit
http://www.exploit-db.com/exploits/17269cve@mitre.org
Exploit
http://www.osvdb.org/72135cve@mitre.org
N/A
http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdfcve@mitre.org
Exploit
http://www.securityfocus.com/bid/47704cve@mitre.org
Exploit
http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdfcve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2011/1174cve@mitre.org
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67267cve@mitre.org
N/A
http://secunia.com/advisories/44417af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.exploit-db.com/exploits/17240af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.exploit-db.com/exploits/17269af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/72135af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdfaf854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/47704af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdfaf854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2011/1174af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/67267af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/44417
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.exploit-db.com/exploits/17240
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.exploit-db.com/exploits/17269
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.osvdb.org/72135
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.securityfocus.com/bid/47704
Source: cve@mitre.org
Resource:
Exploit
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdf
Source: cve@mitre.org
Resource:
US Government Resource
Hyperlink: http://www.vupen.com/english/advisories/2011/1174
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67267
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/44417
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.exploit-db.com/exploits/17240
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.exploit-db.com/exploits/17269
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.osvdb.org/72135
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.security-assessment.com/files/documents/advisory/ICONICS_WebHMI.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.securityfocus.com/bid/47704
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Hyperlink: http://www.us-cert.gov/control_systems/pdf/ICSA-11-131-01.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
US Government Resource
Hyperlink: http://www.vupen.com/english/advisories/2011/1174
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/67267
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found