Логотип exploitDog
bind:CVE-2020-1520
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-1520

Количество 4

Количество 4

nvd логотип

CVE-2020-1520

почти 5 лет назад

A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2020-1520

почти 5 лет назад

Windows Font Driver Host Remote Code Execution Vulnerability

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-qgxw-h3gp-6wg8

около 3 лет назад

A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory., aka 'Windows Font Driver Host Remote Code Execution Vulnerability'.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-04162

почти 5 лет назад

Уязвимость компонента Windows Font Driver Host операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-1520

A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
msrc логотип
CVE-2020-1520

Windows Font Driver Host Remote Code Execution Vulnerability

CVSS3: 7.8
1%
Низкий
почти 5 лет назад
github логотип
GHSA-qgxw-h3gp-6wg8

A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory.An attacker who successfully exploited the vulnerability would gain execution on a victim system.The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory., aka 'Windows Font Driver Host Remote Code Execution Vulnerability'.

CVSS3: 7.8
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-04162

Уязвимость компонента Windows Font Driver Host операционной системы Windows, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
1%
Низкий
почти 5 лет назад

Уязвимостей на страницу