First published: Fri Sep 14 2007(Updated: )
A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Visual Studio | =6.0 | |
Microsoft Visual Studio | =6.0.0.9782 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.