Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-3212

Description

The XSS Filter in Microsoft Internet Explorer 9 through 11 does not properly identify JavaScript, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, aka "Internet Explorer XSS Filter Vulnerability."

POC

Reference

No PoCs from references.

Github

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/ARPSyndicate/cvemon

- https://github.com/GULJAR-E-MOSTAFA/XSS

- https://github.com/H4Bittle/payloads_copied

- https://github.com/H4CK3RT3CH/bug-bounty-reference

- https://github.com/IT-World-ID/XSS

- https://github.com/Mathankumar2701/bug-bounty-reference

- https://github.com/MikeMutter/bug-bounty-reference

- https://github.com/Muhammd/Bug-Bounty-Reference

- https://github.com/Muhammd/awesome-bug-bounty

- https://github.com/Rayyan-appsec/bug-bounty-reference

- https://github.com/Vanshal/Bug-Hunting

- https://github.com/bangkitboss/pentest

- https://github.com/helcaraxeals/bug

- https://github.com/i-snoop-4-u/Refs

- https://github.com/ikszero/BBY

- https://github.com/isnoop4u/Refs

- https://github.com/kdairatchi/MyMac

- https://github.com/krishnasharma14u/Bug-Bounty

- https://github.com/majidabdul82/Bug-Bunty

- https://github.com/nayansmaske1/bbxsspayloads

- https://github.com/ngalongc/bug-bounty-reference

- https://github.com/paulveillard/cybersecurity-bug-bounty

- https://github.com/sajjadsiam/bug-bounty-references

- https://github.com/shahinaali05/cross-site-scripting

- https://github.com/smile2741/pentest

- https://github.com/xbl3/bug-bounty-reference_ngalongc