CVE-2020-0922
11.09.2020, 17:15
<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p> <p>To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.</p> <p>The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.</p>Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | windows_10 | - |
microsoft | windows_10 | - |
microsoft | windows_7 | - |
microsoft | windows_7 | - |
microsoft | windows_8.1 | - |
microsoft | windows_8.1 | - |
microsoft | windows_rt_8.1 | - |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2008 | - |
microsoft | windows_server_2012 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
𝑥
= Vulnerable software versions