exploit the possibilities
Showing 1 - 1 of 1 RSS Feed

Files

Internet Explorer "Aurora" Memory Corruption
Posted Mar 11, 2010
Site metasploit.com

This Metasploit module exploits a memory corruption flaw in Internet Explorer. This flaw was found in the wild and was a key component of the "Operation Aurora" attacks that lead to the compromise of a number of high profile companies. The exploit code is a direct port of the public sample published to the Wepawet malware analysis site. The technique used by this module is currently identical to the public sample, as such, only Internet Explorer 6 can be reliably exploited.

tags | exploit
advisories | CVE-2010-0249
MD5 | e10bb1dd4089bb4b0d4a689573918f4d
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close