This Metasploit module exploits a code execution vulnerability in Microsoft Internet Explorer. Both IE6 and IE7 (Beta 2) are vulnerable. It will corrupt memory in a way, which, under certain circumstances, can lead to an invalid/corrupt table pointer dereference. EIP will point to a very remote, non-existent memory location. This Metasploit module is the result of merging three different exploit submissions and has only been reliably tested against Windows XP SP2. This vulnerability was independently discovered by multiple parties. The heap spray method used by this exploit was pioneered by Skylined.
cc7d3a0a5a7e5685948a23de177b0b8648ee1b05bb7f812884db09692b243c0f
This Metasploit module exploits a vulnerability in Internet Explorer's setTextRange on a checkbox.
d88d10eefc1151c15d86169bcb06ae44b634aacc19080eb4cd937c787a9843d3