### [CVE-2020-0922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0922)                &color=blue)  &color=blue)  &color=blue) &color=blue)   &color=blue)  &color=blue)   &color=blue) &color=blue)       ### Description
A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.
To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.
The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.
### POC #### Reference No PoCs from references. #### Github - https://github.com/404notf0und/CVE-Flow - https://github.com/Cheroxx/Patch-Tuesday-Updates