Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)# CVE-2016-0189
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
Tested on Windows 10 IE11.
### Write-up
http://theori.io/research/cve-2016-0189
### To run
1. Download `support/*.dll` (or compile \*.cpp for yourself) and `exploit/*.html` to a directory.
2. Serve the directory using a webserver (or python's simple HTTP server).
3. Browse with a victim IE to `vbscript_bypass_pm.html`.
4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.)
[4.0K] /data/pocs/6a2a0f41066382e1ac133215a3372d9805c9a9a6
├── [4.0K] exploit
│ ├── [7.8K] vbscript_bypass_pm.html
│ └── [3.8K] vbscript_godmode.html
├── [1.1K] LICENSE
├── [ 494] README.md
└── [4.0K] support
├── [3.7K] ielocalserver.cpp
├── [ 74K] ielocalserver.dll
├── [ 937] ieshell32.cpp
└── [ 68K] ieshell32.dll
2 directories, 8 files