vulnerability
Microsoft Windows: CVE-2020-0674: Scripting Engine Memory Corruption Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Feb 11, 2020 | Feb 11, 2020 | Sep 6, 2024 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Feb 11, 2020
Added
Feb 11, 2020
Modified
Sep 6, 2024
Description
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
Solution(s)
microsoft-windows-windows_10-1507-kb4537776microsoft-windows-windows_10-1607-kb4537764microsoft-windows-windows_10-1709-kb4537789microsoft-windows-windows_10-1803-kb4537762microsoft-windows-windows_10-1809-kb4532691microsoft-windows-windows_10-1903-kb4532693microsoft-windows-windows_10-1909-kb4532693microsoft-windows-windows_server_2012-kb4537767microsoft-windows-windows_server_2012_r2-kb4537767microsoft-windows-windows_server_2016-1607-kb4537764microsoft-windows-windows_server_2019-1809-kb4532691msft-kb4532693-a9b1a21b-4d78-4445-a122-0920a6bed52amsft-kb4532693-bb723d9d-43f9-41c3-ac36-25a6146ee6e3msft-kb4537767-0d25d9e6-9392-439b-a4a7-5ed631eaa02amsft-kb4537767-123e150e-fa00-4078-be72-89af5fe9ec3fmsft-kb4537767-226e6df4-e8e0-40f5-9d45-8d0587d1cedbmsft-kb4537767-455ea2ed-a273-4cf7-a45f-75a3ff1bf986msft-kb4537767-5740f423-306f-4041-84fa-e0b06283283dmsft-kb4537767-65eede61-c4b9-4331-a84c-118081688c9dmsft-kb4537767-6b455414-813f-46c4-8809-7a0b0a9e9809msft-kb4537767-84c8f735-e103-4fa2-a998-74fc7d271a18msft-kb4537767-95d2addb-e05d-4536-bb6a-fad47d596416msft-kb4537767-9fb5c8a1-cc18-4433-bd51-2464a9df0f9amsft-kb4537767-a4fa4418-e9e5-4ca3-a9c2-5932aec4bec9msft-kb4537767-c7b7854d-86ab-4a5d-8831-b48a0bee02b0msft-kb4537767-f3bb8b35-afb3-41b6-9a90-51d0644549db
References
- CVE-2020-0674
- https://attackerkb.com/topics/CVE-2020-0674
- URL-https://support.microsoft.com/help/4532691
- URL-https://support.microsoft.com/help/4532693
- URL-https://support.microsoft.com/help/4537762
- URL-https://support.microsoft.com/help/4537764
- URL-https://support.microsoft.com/help/4537767
- URL-https://support.microsoft.com/help/4537776
- URL-https://support.microsoft.com/help/4537789

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.