#VU5529 Memory corruption in Microsoft Internet Explorer - CVE-2015-2406
Published: January 30, 2017
Microsoft Internet Explorer
Microsoft
Description
The weakness exists due to boundary error. A remote attacker can create a specially crafted Web-site, trick the victim into visiting it, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of the vulnerability results in arbitrary code execution on the vulnerable system.