The exploitation of ActiveX controls is not new to the security community. While initially designed to provide website authors with new embeddable features, and granting Internet Explorer (IE) users ...