A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."
- https://www.exploit-db.com/exploits/41941/
- https://github.com/2bananas4apound/CustomDomato
- https://github.com/ARPSyndicate/cvemon
- https://github.com/googleprojectzero/domato
- https://github.com/marckwei/temp
- https://github.com/mbappe-blip/domato-fork
- https://github.com/merlinepedra/DONATO
- https://github.com/merlinepedra25/DONATO