So,
what we know: You dupe on Recieve Item / Retrieve (So on the 2. or 3. Tab)
You can modify anything, since it is a WebAH (A simple Website with a bit chunk of Javascript)
So it should be possible to inject Malware Code.
Hope someone can proof more Tips. But what I can tell is: Use Fiddler :)
what we know: You dupe on Recieve Item / Retrieve (So on the 2. or 3. Tab)
You can modify anything, since it is a WebAH (A simple Website with a bit chunk of Javascript)
So it should be possible to inject Malware Code.
Hope someone can proof more Tips. But what I can tell is: Use Fiddler :)