Microsoft Internet Explorer 11 (Windows 10) - VBScript Memory Corruption (MS16-051)

Author: Brian Pak
type: local
platform: windows
port: 
date_added: 2016-07-18  
date_updated: 2017-07-14  
verified: 0  
codes: CVE-2016-0189;MS16-051  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 40118.txt  
Source: https://github.com/theori-io/cve-2016-0189

# CVE-2016-0189
Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)

Tested on Windows 10 IE11.

### Write-up
http://theori.io/research/cve-2016-0189

### To run
1. Download `support/*.dll` (or compile \*.cpp for yourself) and `exploit/*.html` to a directory.
2. Serve the directory using a webserver (or python's simple HTTP server).
3. Browse with a victim IE to `vbscript_bypass_pm.html`.
4. (Re-fresh or re-open in case it doesn't work; It's not 100% reliable.)

Exploit-DB Mirror: https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/40118.zip