{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T14:37:11.885","vulnerabilities":[{"cve":{"id":"CVE-2020-0899","sourceIdentifier":"secure@microsoft.com","published":"2020-04-15T15:15:14.403","lastModified":"2024-11-21T04:54:25.547","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability exists when Microsoft Visual Studio updater service improperly handles file permissions, aka 'Microsoft Visual Studio Elevation of Privilege Vulnerability'."},{"lang":"es","value":"Hay una vulnerabilidad de elevación de privilegios cuando el servicio actualizador de Microsoft Visual Studio maneja inapropiadamente los permisos de archivo, también se conoce como \"Microsoft Visual Studio Elevation of Privilege Vulnerability\"."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2017:15.9:*:*:*:*:*:*:*","matchCriteriaId":"6290EF90-AB91-4990-8D44-4F64F49AE133"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2019:16.0:*:*:*:*:*:*:*","matchCriteriaId":"3886D126-9ADC-4AAF-8169-70F3DE3A7773"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2019:16.4:*:*:*:*:*:*:*","matchCriteriaId":"E904F8BF-C415-43BC-89BD-8AD912BEA82A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_2019:16.5.0:*:*:*:*:*:*:*","matchCriteriaId":"6CCC238C-4305-433B-BC0F-8C537C4A963C"}]}]}],"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0899","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0899","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}