17 lines
No EOL
656 B
Text
17 lines
No EOL
656 B
Text
Source: https://github.com/theori-io/cve-2016-0189
|
|
|
|
# CVE-2016-0189
|
|
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
|
|
|
|
Tested on Windows 10 IE11.
|
|
|
|
### Write-up
|
|
http://theori.io/research/cve-2016-0189
|
|
|
|
### To run
|
|
1. Download `support/*.dll` (or compile \*.cpp for yourself) and `exploit/*.html` to a directory.
|
|
2. Serve the directory using a webserver (or python's simple HTTP server).
|
|
3. Browse with a victim IE to `vbscript_bypass_pm.html`.
|
|
4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.)
|
|
|
|
Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40118.zip |