Info about CVE-2020-0674## Test Internet Explorer on CVE-2020-0674
If you can see the text: `jscript.dll says hello` on this page:
https://binaryfigments.github.io/CVE-2020-0674/
Then you can be vulnerable the this attack. You will see the following screen.

Mitigation steps from [Microsoft's advisory](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001)
For 32-bit systems, enter the following command at an administrative command prompt:
```shell
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
```
For 64-bit systems, enter the following command at an administrative command prompt:
```shell
takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N
```
### Links
* https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200001
* https://www.kryptoslogic.com/blog/2020/01/rdp-to-rce-when-fragmentation-goes-wrong/
* https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0674
* https://techcrunch.com/2020/01/18/internet-explorer-security-flaw/
* https://kb.cert.org/vuls/id/338824/
* https://www.us-cert.gov/ncas/current-activity/2020/01/17/microsoft-releases-security-advisory-internet-explorer
* https://securityaffairs.co/wordpress/96560/hacking/cve-2020-0674-ie-0day.html
* https://www.ncsc.nl/actueel/advisory?id=NCSC-2020-0056
[4.0K] /data/pocs/f29d75e300af85c27e8eb83f31d47a0b9894e64f
├── [4.0K] docs
│ ├── [ 160] index.html
│ └── [ 14K] jscript.png
├── [ 14K] jscript.png
├── [1.0K] LICENSE
└── [1.5K] README.md
1 directory, 5 files