CVE-2016-3290Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Internet Explorer

Severity
7.5HIGHNVD
EPSS
12.9%
top 5.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 9
Latest updateMay 14

Description

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3288.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

4
GHSA
GHSA-h935-95pr-wqf9: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vuln2022-05-14
GHSA
GHSA-vmr3-h27j-q58j: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vuln2022-05-14
CVEList
CVE-2016-3290: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vuln2016-08-09
CVEList
CVE-2016-3288: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code via a crafted web page, aka "Internet Explorer Memory Corruption Vuln2016-08-09

📋Vendor Advisories

1
Microsoft
Internet Explorer Memory Corruption Vulnerability2016-08-09

🕵️Threat Intelligence

1
Zscaler
Zscaler found Multiple Security Vulnerabilities | 08-09-2016
CVE-2016-3290 — Microsoft vulnerability | cvebase