Skip to content

Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)

License

Notifications You must be signed in to change notification settings

theori-io/cve-2016-0189

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2016-0189

Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)

Tested on Windows 10 IE11.

Write-up

http://theori.io/research/cve-2016-0189

To run

  1. Download support/*.dll (or compile *.cpp for yourself) and exploit/*.html to a directory.
  2. Serve the directory using a webserver (or python's simple HTTP server).
  3. Browse with a victim IE to vbscript_bypass_pm.html.
  4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.)

About

Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published