mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 19:16:22 +00:00
51 lines
4.7 KiB
Markdown
51 lines
4.7 KiB
Markdown
![]() |
### [CVE-2020-1091](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1091)
|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|
&color=blue)
|
|||
|

|
|||
|
&color=blue)
|
|||
|

|
|||
|
&color=blue)
|
|||
|
&color=blue)
|
|||
|

|
|||
|

|
|||
|
&color=blue)
|
|||
|

|
|||
|
&color=blue)
|
|||
|

|
|||
|

|
|||
|
&color=blue)
|
|||
|
&color=blue)
|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|

|
|||
|
|
|||
|
### Description
|
|||
|
|
|||
|
<p>An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system.</p><p>There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage.</p><p>The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.</p>
|
|||
|
|
|||
|
### POC
|
|||
|
|
|||
|
#### Reference
|
|||
|
No PoCs from references.
|
|||
|
|
|||
|
#### Github
|
|||
|
- https://github.com/404notf0und/CVE-Flow
|
|||
|
|