source: https://www.securityfocus.com/bid/48550/info iMesh is prone to a buffer overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. Successfully exploiting this issue allows remote attackers to execute arbitrary code in the context of the application using an affected ActiveX control (typically Internet Explorer). Failed exploit attempts likely result in denial-of-service conditions. iMesh 10.0 is vulnerable; other versions may also be affected.