{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T13:36:50.484","vulnerabilities":[{"cve":{"id":"CVE-2008-7148","sourceIdentifier":"cve@mitre.org","published":"2009-09-01T16:30:00.657","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in Synfig Animation Studio before 0.61.08 allows attackers to execute arbitrary code via a crafted .sif file."},{"lang":"es","value":"Vulnerabilidad no especificada en Synfig Animation Studio anterior v0.61.08 permite a atacantes ejecutar código a su elección a través de un fichero manipulado .sif."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:*:*:*:*:*:*:*:*","versionEndIncluding":"0.61.07","matchCriteriaId":"10603BB7-9597-41A9-91A1-9D169E562371"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.01:*:*:*:*:*:*:*","matchCriteriaId":"01D23F31-57A1-4DD5-9476-BF269776CF9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.02:*:*:*:*:*:*:*","matchCriteriaId":"B8494D16-12D4-4F22-A366-AAD794271618"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.03:*:*:*:*:*:*:*","matchCriteriaId":"3C6C3079-F5FC-4277-BBE5-16A44994EEE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.04:*:*:*:*:*:*:*","matchCriteriaId":"9BC29900-8C52-4066-9632-580DB2FEB3DC"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.05:*:*:*:*:*:*:*","matchCriteriaId":"463E45F5-156D-4CDA-B892-F1D0FB731625"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.06:*:*:*:*:*:*:*","matchCriteriaId":"F6813559-2A7B-4C17-A061-E320F62B10B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:synfig:synfigstudio:0.61.07:rc1:*:*:*:*:*:*","matchCriteriaId":"7A7B8F73-8606-4E0B-9C71-847947B7CBA8"}]}]}],"references":[{"url":"http://osvdb.org/48854","source":"cve@mitre.org"},{"url":"http://synfig.org/Releases/0.61.08","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/48854","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://synfig.org/Releases/0.61.08","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}