Vulnerability Details : CVE-2019-0920
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0988, CVE-2019-1005, CVE-2019-1055, CVE-2019-1080.
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2019-0920
- cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:10:-:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-0920
12.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-0920
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
NIST |
CWE ids for CVE-2019-0920
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
-
The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later accesses that resource using a type that is incompatible with the original type.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-0920
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0920
CVE-2019-0920 | Scripting Engine Memory Corruption VulnerabilityPatch;Vendor Advisory
-
https://www.zerodayinitiative.com/advisories/ZDI-19-639/
ZDI-19-639 | Zero Day Initiative
-
https://www.zerodayinitiative.com/advisories/ZDI-19-638/
ZDI-19-638 | Zero Day Initiative
-
https://www.zerodayinitiative.com/advisories/ZDI-19-626/
ZDI-19-626 | Zero Day Initiative
-
https://www.zerodayinitiative.com/advisories/ZDI-19-627/
ZDI-19-627 | Zero Day Initiative
-
https://www.zerodayinitiative.com/advisories/ZDI-19-625/
ZDI-19-625 | Zero Day Initiative
Jump to