The exploitation of ActiveX controls is not new to the security community. While initially designed to provide website authors with new embeddable features, and granting Internet Explorer (IE) users ...
I have a simple ActiveX control used on an internal website. This control makes a couple of Win32API calls to force it's host browser window to stay on top of other windows. This is used for help ...
A recent string of high-profile ActiveX vulnerabilities caused the U.S. Computer Emergency Readiness Team (US-CERT) to advise users to disable the ubiquitous Microsoft browser plug-in technology ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results