VULNERABILITY

Microsoft Windows: CVE-2020-0824: Internet Explorer Memory Corruption Vulnerability

Try Surface Command Get a continuous 360° view of your attack surface
Back to Search

Microsoft Windows: CVE-2020-0824: Internet Explorer Memory Corruption Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
03/10/2020
Created
03/11/2020
Added
03/10/2020
Modified
09/06/2024

Description

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.

Solution(s)

  • microsoft-windows-windows_10-1507-kb4540693
  • microsoft-windows-windows_10-1607-kb4540670
  • microsoft-windows-windows_10-1709-kb4540681
  • microsoft-windows-windows_10-1803-kb4540689
  • microsoft-windows-windows_10-1809-kb4538461
  • microsoft-windows-windows_10-1903-kb4540673
  • microsoft-windows-windows_10-1909-kb4540673
  • microsoft-windows-windows_server_2012-kb4540671
  • microsoft-windows-windows_server_2012_r2-kb4540671
  • microsoft-windows-windows_server_2016-1607-kb4540670
  • microsoft-windows-windows_server_2019-1809-kb4538461
  • msft-kb4540671-06105898-a134-4c65-9a25-0de60e1d82ba
  • msft-kb4540671-274e8226-1091-4263-ba72-0911d02509f7
  • msft-kb4540671-2cca1e65-a4e4-4776-a609-c4d48f629df7
  • msft-kb4540671-5290afb0-dad1-41af-bd5d-f17efde6637b
  • msft-kb4540671-73de340f-dfec-421f-8e68-de7bbeeab972
  • msft-kb4540671-8e35ca1e-7787-4ec0-9275-46f6ce2045c6
  • msft-kb4540671-8eaf19d0-98e9-4428-94b3-998f32c2938c
  • msft-kb4540671-b1eef71c-ab46-4103-bc1f-ce08ddb23c69
  • msft-kb4540671-cca85174-9ef0-4b1b-a511-1ea365e22c50
  • msft-kb4540671-e9837c74-ac09-4309-a1a3-8e0dcf366083
  • msft-kb4540671-f38b012b-0e4c-42cd-b46e-591a8c54304e
  • msft-kb4540673-27a7325b-a765-4956-ab15-a19091b61221
  • msft-kb4540673-c13c3539-3ef4-481b-a305-d44fe74d2165

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;