<p>A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system.</p>
<p>To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.</p>
<p>The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.</p>
<p>To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript.</p>
<p>The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.</p>
Project Subscriptions
| Vendors | Products |
|---|---|
|
Microsoft
Subscribe
|
Windows 10
Subscribe
Windows 10 1507
Subscribe
Windows 10 1607
Subscribe
Windows 10 1803
Subscribe
Windows 10 1809
Subscribe
Windows 10 1909
Subscribe
Windows 7
Subscribe
Windows 8.1
Subscribe
Windows Rt 8.1
Subscribe
Windows Server 1903
Subscribe
Windows Server 1909
Subscribe
Windows Server 2004
Subscribe
Windows Server 2008
Subscribe
Windows Server 2008 R2
Subscribe
Windows Server 2008 Sp2
Subscribe
Windows Server 2012
Subscribe
Windows Server 2012 R2
Subscribe
Windows Server 2016
Subscribe
Windows Server 2019
Subscribe
|
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-04T06:18:03.519Z
Reserved: 2019-11-04T00:00:00
Link: CVE-2020-0922
No data.
Status : Modified
Published: 2020-09-11T17:15:14.887
Modified: 2024-11-21T04:54:28.210
Link: CVE-2020-0922
No data.
OpenCVE Enrichment
No data.
Weaknesses