Computer Security
[EN] securityvulns.ru no-pyccku


DVR Remote ActiveX code execution
Published:21.11.2011
Source:
SecurityVulns ID:12047
Type:client
Threat Level:
5/10
Description:It's possible to load dynamic library via DVRobot.DLL
CVE:CVE-2011-3828 (DVRemoteAx.ax 2.1.0.39 in the DVR Remote ActiveX control allows remote attackers to execute arbitrary code via a crafted DVRobot.dll file in a manifest directory on a web server.)
Original documentdocumentSECUNIA, Secunia Research: DVR Remote ActiveX Control DVRobot Library Loading Vulnerability (21.11.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod