Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-7200 PoC — Microsoft Edge 脚本引擎内存损坏漏洞

Source
Associated Vulnerability
Title:Microsoft Edge 脚本引擎内存损坏漏洞 (CVE-2016-7200)
Description:The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.
Description
Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)
Readme
# chakra.dll Info Leak + Type Confusion for RCE
Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)

Tested on Windows 10 Edge (modern.ie stable).

FillFromPrototypes\_TypeConfusion.html: WinExec notepad.exe

FillFromPrototypes\_TypeConfusion\_NoSC.html: 0xcc (INT 3)

### To run
1. Download exploit/FillFromPrototypes\_TypeConfusion.html to a directory.
2. Serve the directory using a webserver (or python's simple HTTP server).
3. Browse with a victim IE to `FillFromPrototypes_TypeConfusion.html`.
File Snapshot

[4.0K] /data/pocs/c2b7a787412dd22c070ab4f18ba44942e5edb316 ├── [4.0K] exploit │   ├── [ 11K] FillFromPrototypes_TypeConfusion.html │   └── [6.5K] FillFromPrototypes_TypeConfusion_NoSC.html ├── [1.0K] LICENSE └── [ 520] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →