Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-8641 PoC — Microsoft Windows Edge和Internet Explorer JavaScript引擎安全漏洞

Source
Associated Vulnerability
Title:Microsoft Windows Edge和Internet Explorer JavaScript引擎安全漏洞 (CVE-2017-8641)
Description:Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Microsoft Edge和Internet Explorer(IE)都是Windows系统附带的Web浏览器。前者是最新操作系统Windows 10附带的默认浏览器,后者是Windows 10之前操作系统附带的默认浏览器。JavaScript engine是其中的一个JavaScript引擎组件。 Microsoft Windows中的IE 9版本至10版本和Edge的JavaScript引擎存在存在远程代码执
Description
There is a classic heap overflow when eval a string which large enough in Chakra! This issue can be reproduced steadly in uptodate Edge in Win10 WIP. An exception will occur immediatly when opening POC.html in Edge.  
Readme
# Description described more from site CVE !!Yes 

Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674. 

====================================================================||>
====================================================================||>

![wallhaven-102938 copy](https://user-images.githubusercontent.com/25440152/29583223-6278bcfa-874d-11e7-90c1-e4b15655dbbe.jpg)

====================================================================||>
====================================================================||> 
File Snapshot

[4.0K] /data/pocs/397a13cf676469aea05ce553dc7e052f8acc6cf8 ├── [ 24K] 42465.html └── [1.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.