{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T22:28:44.641","vulnerabilities":[{"cve":{"id":"CVE-2020-23900","sourceIdentifier":"cve@mitre.org","published":"2021-11-10T22:15:11.187","lastModified":"2024-11-21T05:14:12.060","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in WildBit Viewer v6.6 allows attackers to cause a denial of service (DoS) via a crafted tga file. Related to Data from Faulting Address controls Code Flow starting at Editor!TMethodImplementationIntercept+0x57a3b."},{"lang":"es","value":"Un desbordamiento del búfer en WildBit Viewer versión v6.6, permite a atacantes causar una denegación de servicio (DoS) por medio de un archivo tga diseñado. Relacionado con Datos de los controles de Dirección que Fallan el Flujo de Código que comienza en Editor!TMethodImplementationIntercept+0x57a3b"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wildbit-soft:wildbit_viewer:6.6:*:*:*:*:*:*:*","matchCriteriaId":"22D30D35-E2AE-44DA-B26C-C59787174391"}]}]}],"references":[{"url":"https://github.com/Aurorainfinity/vulnerabilities/blob/master/WildBit_Viewer/tga_file_format.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wildbit-soft.fi/software.html","source":"cve@mitre.org","tags":["Product"]},{"url":"https://github.com/Aurorainfinity/vulnerabilities/blob/master/WildBit_Viewer/tga_file_format.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wildbit-soft.fi/software.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}