7.5
CVSSv3

CVE-2016-7201

Published: 10/11/2016 Updated: 12/10/2018
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 771
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

The Chakra JavaScript scripting engine in Microsoft Edge allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7202, CVE-2016-7203, CVE-2016-7208, CVE-2016-7240, CVE-2016-7242, and CVE-2016-7243.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft edge

Exploits

<!-- Source: bugschromiumorg/p/project-zero/issues/detail?id=945 JavascriptArray::FillFromPrototypes is a method that is used by several Javascript functions available in the browser to set the native elements of an array to the values provide by its prototype This function calls JavascriptArray::ForEachOwnMissingArrayIndexOfObject w ...
Source: githubcom/theori-io/chakra-2016-11 Proofs of Concept: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/40990zip chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromProto ...

Github Repositories

Exploit Development Phrack phrackorg Security Technical Analysis Debugging Skills WinDBG tricks: add anchors into samples HTML/JS/VBS Analysis CVE-2016-7200-CVE-2016-7201-Edge Flash Analysis How to find hook point for dumping embedded flash? Translation X64 Deep Dive Machine Learning Open Source ML Solution Adversarial Machine Learning Techical Blogs A Complete Penetrat

Exploit Development Phrack phrackorg Security Technical Analysis Debugging Skills WinDBG tricks: add anchors into samples HTML/JS/VBS Analysis CVE-2016-7200-CVE-2016-7201-Edge Flash Analysis How to find hook point for dumping embedded flash? Translation X64 Deep Dive Machine Learning Open Source ML Solution Adversarial Machine Learning Techical Blogs A Complete Penetrat

Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)

chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromPrototypes_TypeConfusionhtml: WinExec notepadexe FillFromPrototypes_TypeConfusion_NoSChtml: 0xcc (INT 3) To run Download exploit/FillFromPrototypes_TypeConfusionhtml to a directory Serve the dire

chakradll Info Leak + Type Confusion for RCE Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) Tested on Windows 10 Edge (modernie stable) FillFromPrototypes_TypeConfusionhtml: WinExec notepadexe FillFromPrototypes_TypeConfusion_NoSChtml: 0xcc (INT 3) To run Download exploit/FillFromPrototypes_TypeConfusionhtml to a directory Serve the dire

Recent Articles

Sundown exploit kit weaves Edge hack hole
The Register • Darren Pauli • 11 Jan 2017

Thankfully most users are patched

Authors of the Sundown exploit kit have integrated a since patched and limited Microsoft Edge vulnerability from a security firm's public proof-of-concept. The addition of the twin bugs (CVE-2016-7200 and CVE-2016-7201) means unpactched users of one of the world's most unpopular web browsers are likely to be targeted by a wide cross-section of malware writers. It is no cause for high concern for most Windows users: the Edge browser by default applies patches automatically meaning fewer users wou...