{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:14:43.514","vulnerabilities":[{"cve":{"id":"CVE-2020-15680","sourceIdentifier":"security@mozilla.org","published":"2020-10-22T21:15:13.263","lastModified":"2024-11-21T05:06:00.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82."},{"lang":"es","value":"Si fue referenciado un manejador de protocolo externo válido en una etiqueta de imagen, el tamaño de imagen rota resultante podría distinguirse de un tamaño de imagen rota de un manejador de protocolo inexistente.&#xa0;Esto permitió que un atacante probara con éxito si se había registrado un manejador de protocolo externo.&#xa0;Esta vulnerabilidad afecta a Firefox versiones anteriores a 82"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*","versionEndExcluding":"82.0","matchCriteriaId":"A99DBC67-F226-4E09-B6C2-1B4346AEC802"}]}]}],"references":[{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658881","source":"security@mozilla.org","tags":["Issue Tracking","Permissions Required","Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2020-45/","source":"security@mozilla.org","tags":["Release Notes","Vendor Advisory"]},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1658881","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Permissions Required","Vendor Advisory"]},{"url":"https://www.mozilla.org/security/advisories/mfsa2020-45/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Release Notes","Vendor Advisory"]}]}}]}