{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T11:18:37.196","vulnerabilities":[{"cve":{"id":"CVE-2020-0696","sourceIdentifier":"secure@microsoft.com","published":"2020-02-11T22:15:16.477","lastModified":"2024-11-21T04:54:01.383","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'."},{"lang":"es","value":"Se presenta una vulnerabilidad de omisión de la característica de seguridad en el software Microsoft Outlook cuando maneja inapropiadamente el análisis de formatos URI, también se conoce como \"Microsoft Outlook Security Feature Bypass Vulnerability\"."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*","matchCriteriaId":"C5282C83-86B8-442D-851D-B54E88E8B1F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*","matchCriteriaId":"CA035812-F35A-43F1-9A8D-EE02201AA10A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"F9A115C1-45EB-4688-AD7C-C1854850EE9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"D7B6DF1E-0DDA-4809-B216-7CEFE0A53E2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*","matchCriteriaId":"E2B1657C-0FF4-461A-BE2A-641275C4B0A0"}]}]}],"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0696","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0696","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}