[ authorization ] [ registration ] [ Ripristina ]
Contattaci
Ci puoi contattare tramite:
0day.today Exploits Market and 0day Exploits Database

Microsoft Internet Explorer WININET.dll - CHttp­Header­Parser::Parse­Status­Line Out-of-Bounds Read

[ 0Day-ID-26306 ]
Titolo
Microsoft Internet Explorer WININET.dll - CHttp­Header­Parser::Parse­Status­Line Out-of-Bounds Read [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price:
Data inserimento
Categoria
Piattaforma
Verificato
Prezzo
FREE
Rischio
[
Security Risk Medium
]
Rel. releases
Descrizione
A specially crafted HTTP response can cause the CHttpHeaderParser::ParseStatusLine method in WININET to read data beyond the end of a buffer. The size of the read can be controlled through the HTTP response. An attacker that is able to get any application that uses WININET to make a request to a server under his/her control may be able to disclose information stored after this memory block. This includes Microsoft Internet Explorer.
CVE
CVE-2016-3325
Other Information
Abuses
0
Commenti
0
Visualizzazioni
3 904
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
FREE
Open Exploit
You can open this source code for free
Open Exploit
Open Exploit
You can open this source code for free
Verified by
Verified by
This material is checked by Administration and absolutely workable.
Autore
BL
29
Exploits
59
Lettori
0
[ Commenti: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Entra o registrati per lasciare un commento