Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Internet Explorer 10 | Windows Server 2012 | - | |
| Microsoft | Internet Explorer 11 | Windows 10 Version 1803 for 32-bit Systems | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for 32-bit Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for x64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1909 for ARM64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for 32-bit Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for x64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows 10 Version 1903 for ARM64-based Systems | unspecified | - | |
| Microsoft | Internet Explorer 11 on Windows Server 2012 | unspecified | - | |
| Microsoft | Internet Explorer 9 | Windows Server 2008 for x64-based Systems Service Pack 2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Info about CVE-2020-0674 | https://github.com/5l1v3r1/CVE-2020-0674 | POC Details |
| 2 | This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7. | https://github.com/maxpl0it/CVE-2020-0674-Exploit | POC Details |
| 3 | None | https://github.com/Ken-Abruzzi/CVE-2020-0674 | POC Details |
| 4 | 随便放点自己弄的小东西 | https://github.com/Neko-chanQwQ/CVE-2020-0674-PoC | POC Details |
| 5 | Porting the CVE-2020-0674 exploit for Windows8.1 and Windows10 | https://github.com/Micky-Thongam/Internet-Explorer-UAF | POC Details |
No public POC found.
Login to generate AI POCNo comments yet