This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote host has a web application installed that is affected by a
code execution vulnerability.
The version of McAfee SmartFilter Administration installed on the
remote Windows host is earlier than 4.2.1.01. It is, therefore,
potentially affected by a code execution vulnerability. The Remote
Method Invocation service can be used without authentication to deploy a
malicious .war file. By exploiting this flaw, a remote, unauthenticated
attacker could execute arbitrary code subject to the privileges of the
user running the affected application.
See also :
Upgrade to McAfee SmartFilter Administration 4.2.1.01 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false