mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-16 20:27:21 +00:00
52 lines
4.7 KiB
Markdown
52 lines
4.7 KiB
Markdown
### [CVE-2020-0922](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0922)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|
&color=blue)
|
|

|
|

|
|
&color=blue)
|
|

|
|
&color=blue)
|
|

|
|

|
|
&color=blue)
|
|
&color=blue)
|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p><p>To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.</p><p>The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.</p>
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/404notf0und/CVE-Flow
|
|
- https://github.com/Cheroxx/Patch-Tuesday-Updates
|
|
|