### [CVE-2016-7288](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7288) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The scripting engines in Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7286, CVE-2016-7296, and CVE-2016-7297. ### POC #### Reference - http://packetstormsecurity.com/files/140994/Microsoft-Edge-TypedArray.sort-Use-After-Free.html - https://www.exploit-db.com/exploits/41357/ #### Github - https://github.com/0x9k/Browser-Security-Information - https://github.com/0xZipp0/BIBLE - https://github.com/ARPSyndicate/cvemon - https://github.com/Ashadowkhan/PENTESTINGBIBLE - https://github.com/Mathankumar2701/ALL-PENTESTING-BIBLE - https://github.com/MedoX71T/PENTESTING-BIBLE - https://github.com/NetW0rK1le3r/PENTESTING-BIBLE - https://github.com/OCEANOFANYTHING/PENTESTING-BIBLE - https://github.com/Rayyan-appsec/ALL-PENTESTING-BIBLE - https://github.com/Saidul-M-Khan/PENTESTING-BIBLE - https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE - https://github.com/cwannett/Docs-resources - https://github.com/dli408097/pentesting-bible - https://github.com/guzzisec/PENTESTING-BIBLE - https://github.com/hacker-insider/Hacking - https://github.com/lnick2023/nicenice - https://github.com/nitishbadole/PENTESTING-BIBLE - https://github.com/otravidaahora2t/js-vuln-db - https://github.com/phant0n/PENTESTING-BIBLE - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/readloud/Pentesting-Bible - https://github.com/tunz/js-vuln-db - https://github.com/xbl3/awesome-cve-poc_qazbnm456 - https://github.com/yusufazizmustofa/BIBLE