![]() |
![]() |
![]() |
![]() |
Microsoft Internet Explorer allows web authors to add code and interactivity to their HTML pages. Often, with that greater power comes greater risk, in the form of malicious code. This document describes the potential security hazards of allowing trusted code in ActiveX controls to be accessed from untrusted scripts and initialized from untrusted data, and discusses hows controls can be marked as safe for these actions so that the user won't receive warning dialogs.
Introduction
Scripting Security Hazards
Marking a Control as Safe