Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Internet Explorer 10 | Windows Server 2012 | - | |
| Microsoft | Internet Explorer 11 | Windows 10 Version 1803 for 32-bit Systems | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows Server 2012 | unspecified | - | |
| Microsoft | Internet Explorer 9 | Windows Server 2008 for x64-based Systems Service Pack 2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Info about CVE-2020-0674 | https://github.com/5l1v3r1/CVE-2020-0674 | POC Details |
| 2 | This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7. | https://github.com/maxpl0it/CVE-2020-0674-Exploit | POC Details |
| 3 | None | https://github.com/Ken-Abruzzi/CVE-2020-0674 | POC Details |
| 4 | 随便放点自己弄的小东西 | https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC | POC Details |
| 5 | Porting the CVE-2020-0674 exploit for Windows8.1 and Windows10 | https://github.com/Micky-Thongam/Internet-Explorer-UAF | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-0727 | Microsoft Connected User Experiences and Telemetry Service 安全漏洞 | |
| CVE-2020-0721 | Microsoft Win32k组件安全漏洞 | |
| CVE-2020-0716 | Microsoft Win32k组件信息泄露漏洞 | |
| CVE-2020-0715 | Microsoft Windows Graphics组件安全漏洞 | |
| CVE-2020-0714 | Microsoft Windows DirectX 信息泄露漏洞 | |
| CVE-2020-0713 | Microsoft Edge和ChakraCore 缓冲区错误漏洞 | |
| CVE-2020-0712 | Microsoft Edge和ChakraCore 缓冲区错误漏洞 | |
| CVE-2020-0717 | Microsoft Win32k组件信息泄露漏洞 | |
| CVE-2020-0725 | Microsoft Win32k组件安全漏洞 | |
| CVE-2020-0726 | Microsoft Win32k组件安全漏洞 | |
| CVE-2020-0724 | Microsoft Win32k组件安全漏洞 | |
| CVE-2020-0728 | Microsoft Windows 信息泄露漏洞 | |
| CVE-2020-0729 | Microsoft Windows和Windows Server 安全漏洞 | |
| CVE-2020-0730 | Microsoft Windows 后置链接漏洞 | |
| CVE-2020-0731 | Microsoft Windows Server 资源管理错误漏洞 | |
| CVE-2020-0732 | Microsoft DirectX 安全漏洞 | |
| CVE-2020-0733 | Microsoft Windows Malicious Software Removal Tool 安全漏洞 | |
| CVE-2020-0734 | Microsoft Remote Desktop Protocol Client 输入验证错误漏洞 | |
| CVE-2020-0735 | Microsoft Windows Search Indexer 安全漏洞 | |
| CVE-2020-0736 | Microsoft Windows Kernel 信息泄露漏洞 |
Showing top 20 of 99 CVEs. View all on vendor page → →
No comments yet