The tool, called Dranzer, lets software developers test ActiveX controls for vulnerabilities before the software is released to the public. A programming or design flaw in an ActiveX control can allow an attacker to execute arbitrary code by convincing a user to view a specially crafted web page. Users must agree to the terms of a license before installing the tool. The group behind the tool has also released a technical document that outlines the history, motivations, and rationale for an open-source fuzz testing tool.
Source: https://threatpost.com/dranzer-fuzzing-activex-vulnerabilities-042709/72552/

