### [CVE-2012-1876](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1876) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012. ### POC #### Reference - http://www.zdnet.com/blog/security/pwn2own-2012-ie-9-hacked-with-two-0day-vulnerabilities/10621 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-037 #### Github - https://github.com/ExploitCN/CVE-2012-1876-win7_x86_and_win7x64 - https://github.com/WizardVan/CVE-2012-1876 - https://github.com/ernestang98/win-exploits - https://github.com/migraine-sudo/Arsenal - https://github.com/ricew4ng/BrowserSecurity - https://github.com/ser4wang/BrowserSecurity