source: https://www.securityfocus.com/bid/10064/info The Blaxxun Contact 3D browser object for Internet Explorer is reported to be prone to a buffer overflow vulnerability. The issue is reportedly due to a lack of sufficient boundary checks performed on data assigned to a browser object variable. It may be possible for an attacker to seize control of the execution flow for the affected browser object, ultimately influencing execution flow into an attacker-supplied payload.