This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote Windows host has an ActiveX control that is affected by a
buffer overflow vulnerability.
The remote host has the TRENDnet SecurView UltraMJCam ActiveX control
installed. A stack-based buffer overflow can be triggered by providing
an overlong argument to the 'OpenFileDlg()' method. This is because
the method does not verify the size of the argument before calling
By tricking a user into opening a specially crafted web page, a
remote, unauthenticated attacker could execute arbitrary code on the
remote host subject to the user's privileges.
See also :
Remove or disable the control as fixes are not available.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.4
Public Exploit Available : true