This indicates an attack attempt to exploit a memory corruption vulnerability in Zenturi ProgramChecker.
The vulnerability is located in the "sasatl.dll" ActiveX control through the improper usage of "DebugMsgLog" or "DoFileProperties" methods. It may allow remote attackers to execute arbitrary code in the context of the application using the affected ActiveX control. Failed exploit attempts will likely cause the program to crash,resulting in a denial of service condition.
Zenturi ProgramChecker ActiveX Control.
System Compromise: Remote attackers can gain control of vulnerable systems.
Currently we are not aware of any vendor supplied patch for this issue.