7.6
CVSSv2

CVE-2020-0674

Published: 11/02/2020 Updated: 01/01/2022
CVSS v2 Base Score: 7.6 | Impact Score: 10 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 678
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet_explorer 9

microsoft internet_explorer 10

microsoft internet_explorer 11

Exploits

Firefox 72 IonMonkey JIT type confusion exploit ...
Microsoft Internet Explorer 11 use-after free exploit that triggers when Arraysort() is called with a comparator function The two arguments are untracked by the garbage collector ...
Microsoft Internet Explorer 11 32-bit use-after-free exploit ...
Microsoft Internet Explorer 8/11 and WPAD service Jscriptdll use-after-free exploit ...

Github Repositories

CVE-2020-0674 CVE-2020-0674 is a use-after-free vulnerability in the legacy jscript engine It can be triggered in Internet Explorer The exploit here is written by maxpl0it but the vulnerability itself was discovered by Qihoo 360 being used in the wild This exploit simply pops calc Exploit writeup can be found here Vulnerability Overview The vulnerability exists in the Arr

This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.

CVE-2020-0674 CVE-2020-0674 is a use-after-free vulnerability in the legacy jscript engine It can be triggered in Internet Explorer The exploit here is written by maxpl0it but the vulnerability itself was discovered by Qihoo 360 being used in the wild This exploit simply pops calc Exploit writeup can be found here Vulnerability Overview The vulnerability exists in the Arr

A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques

________ ___ __ _________ __ \______ \ ____ __ __\_ |__ | | ____ / _____/_/ |_ _____ _______ | | \ / _ \ | | \| __ \ | | _/ __ \ \_____ \ \ __\\__ \ \_ __ \ | ` \( <_> )| | /| \_\ \| |__\ ___/ / \ | | / __ \_| | \/ /_______ / \____/ |____/ |___ /|____/ \___

随便放点自己弄的小东西

CVE-2020-0674 关于该漏洞的复现操作: 关键在于Html的编写 Python源码提供自动化测试Html网页的功能 利用selenium库 提供的IEdriver测试下来支持IE11 脚本使用需要输入Html路径以及驱动路径

An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).

CVE-2019-17026 - A Firefox JIT bug Original bug caught in the wild by Qihoo 360 Exploit written by maxpl0it Works on Firefox < 7201 This is an exploit for CVE-2190-17026: IonMonkey type confusion with StoreElementHole and FallibleStoreElement This exploit does not use a sandbox escape, so for testing the securitysandboxcontentlevel attribute in about:config need

Some exploits and pocs.

CVEs Some exploits and pocs Jscriptdll CVE Number Feature Keywords Expliot CVE-2019-1367 Arraysort Use After Free Reallocate freed GcBlocks CVE-2020-0674 Arraysort Use After Free Reallocate freed GcBlocks

Recent Articles

Microsoft Patch Tuesday – February 2020
Symantec Threat Intelligence Blog • Preethi Koroth • 12 Feb 2024

This month the vendor has patched 99 vulnerabilities, 13 of which are rated Critical.

Posted: 12 Feb, 202024 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – February 2020This month the vendor has patched 99 vulnerabilities, 13 of which are rated Critical.This month the vendor has patched 99 vulnerabilities, 13 of which are rated Critical. As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required...

Rubbish software security patches responsible for a quarter of zero-days last year
The Register • Thomas Claburn in San Francisco • 03 Feb 2021

Google wants researchers, vendors to stop making attacks easy Apple emits emergency iOS security updates while warning holes may have been exploited in wild by hackers

Enigma To limit the impact of zero-day vulnerabilities, Google security researcher Maddie Stone would like those developing software fixes to stop delivering shoddy patches. In a presentation at USENIX's Enigma 2021 virtual conference on Tuesday, Stone offered an overview of the zero-day exploits detected in 2020. A zero-day, she explained for attendees outside the infosec community, refers to an exploit targeting a previously unidentified vulnerability. Zero-day flaws are a problem because they...

IT threat evolution Q2 2020
Securelist • David Emm • 03 Sep 2020

IT threat evolution Q2 2020. PC statistics IT threat evolution Q2 2020. Mobile statistics In April, we reported the results of our investigation into a mobile spyware campaign that we call ‘PhantomLance’. The campaign involved a backdoor Trojan that the attackers distributed via dozens of apps in Google Play and elsewhere. Dr Web first reported the malware in July 2019, but we decided to investigate because the Trojan was more sophisticated than most malware for stealing money or displaying ...

Internet Explorer and Windows zero-day exploits used in Operation PowerFall
Securelist • Boris Larin • 12 Aug 2020

In May 2020, Kaspersky technologies prevented an attack on a South Korean company by a malicious script for Internet Explorer. Closer analysis revealed that the attack used a previously unknown full chain that consisted of two zero-day exploits: a remote code execution exploit for Internet Explorer and an elevation of privilege exploit for Windows. Unlike a previous full chain that we discovered, used in Operation WizardOpium, the new full chain targeted the latest builds of Windows 10, and our ...

Magnitude exploit kit – evolution
Securelist • Boris Larin • 24 Jun 2020

Exploit kits are not as widespread as they used to be. In the past, they relied on the use of already patched vulnerabilities. Newer and more secure web browsers with automatic updates simply do not allow known vulnerabilities to be exploited. It was very different back in the heyday of Adobe Flash because it’s just a plugin for a web browser, meaning that even if the user has an up-to-date browser, there’s a non-zero chance that Adobe Flash may still be vulnerable to 1-day exploits. Now tha...

IT threat evolution Q1 2020. Statistics
Securelist • Victor Chebyshev Fedor Sinitsyn Denis Parinov Oleg Kupreev Evgeny Lopatin Alexey Kulaev • 20 May 2020

These statistics are based on detection verdicts for Kaspersky products received from users who consented to providing statistical data. According to Kaspersky Security Network, Q1 2020 will be remembered primarily for the coronavirus pandemic and cybercriminals’ exploitation of the topic. In particular, the creators of a new modification of the Ginp banking trojan renamed their malware Coronavirus Finder and then began offering it for €0.75 disguised as an app supposedly capable of detectin...

If you're running Windows, I feel bad for you, son. Microsoft's got 99 problems, better fix each one
The Register • Shaun Nichols in San Francisco • 11 Feb 2020

Meanwhile, we're still squashing bugs in Adobe Flash Player... plus stuff from Intel and SAP

Patch Tuesday It's going to be a busy month for IT administrators as Microsoft, Intel, Adobe, and SAP have teamed up to deliver a bumper crop of security fixes for Patch Tuesday. Microsoft had one of its largest patch bundles in recent memory, as the Windows giant released fixes for 99 CVE-listed vulnerabilities. These included CVE-2020-0674, a remote code execution flaw in Internet Explorer's Trident rendering engine that is already being exploited in the wild. This hole would typically be expl...

It's Friday, the weekend has landed... and Microsoft warns of an Internet Explorer zero day exploited in the wild
The Register • Shaun Nichols in San Francisco • 18 Jan 2020

Plus, WeLeakInfo? Not anymore!

Roundup Welcome to another Reg roundup of security news. Microsoft let slip on Friday an advisory detailing an under-attack zero-day vulnerability (CVE-2020-0674) for Internet Explorer. The scripting engine flaw can be exploited to gain remote code execution on a vulnerable machine by way of a specially crafted webpage. The flaw can be mitigated by restricting access to the JavaScript component JScript.dll, and thus far there is no patch available. "Microsoft is aware of this vulnerability and w...