### [CVE-2016-0189](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0189) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0187. ### POC #### Reference - https://www.exploit-db.com/exploits/40118/ - https://www.virusbulletin.com/virusbulletin/2017/01/journey-and-evolution-god-mode-2016-cve-2016-0189/ #### Github - https://github.com/ARPSyndicate/cvemon - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CrossGroupSecurity/PowerShell-MS16-051-IE-RCE - https://github.com/DaramG/IS571-ACSP-Fall-2018 - https://github.com/ExploitSori/2017Codegate_Drive-ByDownload - https://github.com/GhostTroops/TOP - https://github.com/JERRY123S/all-poc - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/RingLcy/VulnerabilityAnalysisAndExploit - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/deamwork/MS16-051-poc - https://github.com/hktalent/TOP - https://github.com/jbmihoub/all-poc - https://github.com/nao-sec/RigEK - https://github.com/theori-io/cve-2016-0189 - https://github.com/weeka10/-hktalent-TOP