{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:00:44.900","vulnerabilities":[{"cve":{"id":"CVE-2020-1342","sourceIdentifier":"secure@microsoft.com","published":"2020-07-14T23:15:12.713","lastModified":"2024-11-21T05:10:17.193","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1445."},{"lang":"es","value":"Se presenta una vulnerabilidad de divulgación de información cuando el software Microsoft Office lee la memoria fuera de limites debido a una variable no inicializada, que podría revelar el contenido de la memoria, también se conoce como \"Microsoft Office Information Disclosure Vulnerability\". Este ID de CVE es diferente de CVE-2020-1445"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"},{"lang":"en","value":"CWE-908"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*","matchCriteriaId":"40C15EDD-98D4-4D06-BA06-21AE0F33C72D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"081DE1E3-4622-4C32-8B9C-9AEC1CD20638"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2016:*:*:*:*:macos:*:*","matchCriteriaId":"8B615D7A-B7F2-44DF-8699-EB8367ADE65C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*","matchCriteriaId":"C5282C83-86B8-442D-851D-B54E88E8B1F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*","matchCriteriaId":"40961B9E-80B6-42E0-A876-58B3CE056E4E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*","matchCriteriaId":"E98AE986-FA31-4301-8025-E8915BA4AC5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"A8235774-4B57-4793-BE26-2CDE67532EDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"B3C3FC9A-D8E5-493A-A575-C831A9A28815"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"A5D3A185-BE57-403E-914E-FDECEC3A477C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*","matchCriteriaId":"9C082CC4-6128-475D-BC19-B239E348FDB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*","matchCriteriaId":"6122D014-5BF1-4AF4-8B4D-80205ED7785E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"24EEDAD9-9656-4B21-82E4-D60B83777492"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"32E1400A-836A-4E48-B2CD-2B0A9A8241BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*","matchCriteriaId":"45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*","matchCriteriaId":"4DA042D4-B14E-4DDF-8423-DFB255679EFE"}]}]}],"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1342","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1342","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}