Skip to content

safeing/CVE-2020-0674

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Test Internet Explorer on CVE-2020-0674

If you can see the text: jscript.dll says hello on this page: https://binaryfigments.github.io/CVE-2020-0674/

Then you can be vulnerable the this attack. You will see the following screen.

jscript.png

Mitigation steps from Microsoft's advisory

For 32-bit systems, enter the following command at an administrative command prompt:

takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

For 64-bit systems, enter the following command at an administrative command prompt:

takeown /f %windir%\syswow64\jscript.dll
cacls %windir%\syswow64\jscript.dll /E /P everyone:N
takeown /f %windir%\system32\jscript.dll
cacls %windir%\system32\jscript.dll /E /P everyone:N

Links

About

Info about CVE-2020-0674

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors