Used Windows 2000 ActiveX Parameter Validation Vulnerability Patch for Windows?
Developer’s Description
An ActiveX control that ships as part of Windows 2000 contains an unchecked buffer. If the control was called from a Web page or HTML mail using a specially-malformed parameter, it would be possible to cause code to execute on the machine via a buffer overrun. This could potentially enable a malicious user to take any desired action on the user's machine, limited only by the permissions of the user.
The vulnerability could only be exploited if ActiveX controls are enabled in IE, Outlook, or Outlook Express. The Security Zones feature in Internet Explorer enables customers to limit what Web sites can do, and customers who have used the feature to prevent untrusted sites from invoking ActiveX controls would be at minimal risk from the Web-based attack scenario. Customers who have applied the Outlook Security Update would be protected against the mail-borne scenario, since it moves mail into the Restricted Sites Zone, thereby preventing HTML mails from invoking ActiveX controls.
See the ActiveX Parameter Validation Vulnerability FAQ for more information.
Used Windows 2000 ActiveX Parameter Validation Vulnerability Patch for Windows?
Explore More

S.S.E. File Encryptor for PC
Free
Cryptic Disk Free
Free
Ensafer
FreeFileCrypt Acrobat Pro
Trial version
Kernel Outlook Express Password Recovery
Free
FoxCrypt File Protection standard
Trial versionV-Pad
Trial version
CEX
Trial version
X-Lizard Password Manager
Trial versionTop Secret
Trial versionMy Computer Vault
Trial version
CrocodileNote
Free