7.6
CVSSv2

CVE-2016-7200

Published: 10/11/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 771
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Chakra JavaScript scripting engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7201, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft edge

Exploits

<!-- Source: bugschromiumorg/p/project-zero/issues/detail?id=922 There is an info leak in Arrayfilter In Chakra, the destination array that arrays are filtered into is initialized using ArraySpeciesCreate, which can create both native and variable arrays However, the loop that calls the filter function assumes that the destination ...
Source: githubcom/theori-io/chakra-2016-11 Proofs of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40990zip chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromProto ...

Github Repositories

Exploit Development Phrack phrackorg Security Technical Analysis Debugging Skills WinDBG tricks: add anchors into samples HTML/JS/VBS Analysis CVE-2016-7200-CVE-2016-7201-Edge Flash Analysis How to find hook point for dumping embedded flash? Translation X64 Deep Dive Machine Learning Open Source ML Solution Adversarial Machine Learning Techical Blogs A Complete Penetrat

Exploit Development Phrack phrackorg Security Technical Analysis Debugging Skills WinDBG tricks: add anchors into samples HTML/JS/VBS Analysis CVE-2016-7200-CVE-2016-7201-Edge Flash Analysis How to find hook point for dumping embedded flash? Translation X64 Deep Dive Machine Learning Open Source ML Solution Adversarial Machine Learning Techical Blogs A Complete Penetrat

Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)

chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromPrototypes_TypeConfusionhtml: WinExec notepadexe FillFromPrototypes_TypeConfusion_NoSChtml: 0xcc (INT 3) To run Download exploit/FillFromPrototypes_TypeConfusionhtml to a directory Serve the dire

chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromPrototypes_TypeConfusionhtml: WinExec notepadexe FillFromPrototypes_TypeConfusion_NoSChtml: 0xcc (INT 3) To run Download exploit/FillFromPrototypes_TypeConfusionhtml to a directory Serve the dire

Recent Articles

Sundown exploit kit weaves Edge hack hole
The Register • Darren Pauli • 11 Jan 2017

Thankfully most users are patched

Authors of the Sundown exploit kit have integrated a since patched and limited Microsoft Edge vulnerability from a security firm's public proof-of-concept. The addition of the twin bugs (CVE-2016-7200 and CVE-2016-7201) means unpactched users of one of the world's most unpopular web browsers are likely to be targeted by a wide cross-section of malware writers. It is no cause for high concern for most Windows users: the Edge browser by default applies patches automatically meaning fewer users wou...