#VU276 Memory Corruption Vulnerability in Microsoft Internet Explorer - CVE-2016-3290
Published: August 10, 2016 / Updated: January 25, 2017
Microsoft Internet Explorer
Microsoft
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted web page, trick a victim to visit that page, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability my allow an attacker to run arbitrary code on vulnerable system.