#VU5415 Memory corruption in Microsoft Internet Explorer - CVE-2015-2502
Published: January 26, 2017 / Updated: November 20, 2020
Microsoft Internet Explorer
Microsoft
Description
The weakness exists due to boundary error when handling Javascript and HTML tables within the layout cache. A remote attacker can create a specially crafted Web site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation results in arbitrary code execution on the vulnerable system.
Note: the vulnerability was being actively exploited.