Uninformed: Informative Information for the Uninformed

Vol 9» 2008.Jan

ActiveX - Active Exploitation
This paper provides a general introduction to the topic of understanding security vulnerabilities that affect ActiveX controls. A brief description of how ActiveX controls are exposed to Internet Explorer is given along with an analysis of three example ActiveX vulnerabilities that have been previously disclosed.
html | txt | pdf