A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/159137/Microsoft-Internet-Explorer-11-Use-After-Free.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/161309/Microsoft-Internet-Explorer-11-Use-After-Free.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html | Exploit Third Party Advisory VDB Entry |
https://github.com/maxpl0it/CVE-2020-0674-Exploit | Exploit Third Party Advisory |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0674 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
01 Jan 2022, 19:51
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
References | (MISC) http://packetstormsecurity.com/files/162565/Microsoft-Internet-Explorer-8-11-Use-After-Free.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-02-11 22:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-0674
Mitre link : CVE-2020-0674
CVE.ORG link : CVE-2020-0674
JSON object : View
Products Affected
microsoft
- windows_server_2012
- windows_server_2008
- windows_server_2019
- windows_rt_8.1
- internet_explorer
- windows_7
- windows_8.1
- windows_10
CWE
CWE-416
Use After Free