{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T06:53:55.423","vulnerabilities":[{"cve":{"id":"CVE-2020-3951","sourceIdentifier":"security@vmware.com","published":"2020-03-17T19:15:12.097","lastModified":"2024-11-21T05:32:01.220","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMware Workstation (15.x before 15.5.2) and Horizon Client for Windows (5.x and prior before 5.4.0) contain a denial-of-service vulnerability due to a heap-overflow issue in Cortado Thinprint. Attackers with non-administrative access to a guest VM with virtual printing enabled may exploit this issue to create a denial-of-service condition of the Thinprint service running on the system where Workstation or Horizon Client is installed."},{"lang":"es","value":"VMware Workstation (versiones 15.x anteriores a 15.5.2) y Horizon Client for Windows (versiones 5.x y anteriores a 5.4.0), contienen una vulnerabilidad de denegación de servicio debido a un problema de desbordamiento de la pila en Cortado Thinprint. Los atacantes con acceso no administrativo a una máquina virtual invitada con impresión virtual habilitada pueden explotar este problema para crear una condición de denegación de servicio del servicio Thinprint que se ejecuta sobre el sistema donde Workstation o Horizon Client está instalada."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L","baseScore":3.8,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.0,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:horizon_client:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.4.0","matchCriteriaId":"4F835663-B6E8-41FB-BDE0-C847E9086448"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.5.2","matchCriteriaId":"84A3302D-706B-4260-8407-121D7C2F0867"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"}]}]}],"references":[{"url":"https://www.vmware.com/security/advisories/VMSA-2020-0005.html","source":"security@vmware.com","tags":["Vendor Advisory"]},{"url":"https://www.vmware.com/security/advisories/VMSA-2020-0005.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}