cve/2016/CVE-2016-0189.md

37 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-0189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0189)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187.
### POC
#### Reference
- https://www.exploit-db.com/exploits/40118/
- https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/CrossGroupSecurity/PowerShell-MS16-051-IE-RCE
- https://github.com/DaramG/IS571-ACSP-Fall-2018
- https://github.com/ExploitSori/2017Codegate_Drive-ByDownload
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/RingLcy/VulnerabilityAnalysisAndExploit
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/deamwork/MS16-051-poc
- https://github.com/hktalent/TOP
- https://github.com/jbmihoub/all-poc
- https://github.com/nao-sec/RigEK
- https://github.com/theori-io/cve-2016-0189
- https://github.com/weeka10/-hktalent-TOP