#VU277 Memory Corruption Vulnerability in Microsoft Internet Explorer - CVE-2016-3293
Published: August 10, 2016
Microsoft Internet Explorer
Microsoft
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to boundary error when parsing objects in memory. A remote attacker can create a specially crafted web page, trick a victim to visit that page, trigger memory corruption and execute arbitrary code on the target system with privileges of the current user.
Successful exploitation of this vulnerability my allow an attacker to run arbitrary code on vulnerable system.