[local] – Internet Explorer 11 (on Windows 10) – VBScript Memory Corruption Proof-of-Concept Exploit (MS16-051)
Source: http://ift.tt/2a2h59E; # CVE-2016-0189 Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) Tested on Windows 10 IE11. ### Write-up http://ift.tt/2a2gSn3; ### To run 1. Download `support/*.dll` (or compile \*.cpp for yourself) and `exploit/*.html` to a directory. 2. Serve the directory using a webserver (or python's simple HTTP server). 3. Browse with a victim IE to `vbscript_bypass_pm.html`. 4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.) EDB-Mirror: http://ift.tt/29HxSiS
Security
via Exploit-DB Updates http://ift.tt/1HHo1m3
July 18, 2016 at 10:30AM
Leave a comment