{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T15:57:09.522","vulnerabilities":[{"cve":{"id":"CVE-2020-24292","sourceIdentifier":"cve@mitre.org","published":"2023-08-22T19:16:19.647","lastModified":"2024-11-21T05:14:33.840","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer Overflow vulnerability in load function in PluginICO.cpp in FreeImage 3.19.0 [r1859] allows remote attackers to run arbitrary code via opening of crafted ico file."},{"lang":"es","value":"La vulnerabilidad de desbordamiento del búfer en la función load de PluginICO.cpp en FreeImage 3.19.0 [r1859] permite a atacantes remotos ejecutar código arbitrario a través de la apertura de un archivo ico manipulado.\n"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freeimage_project:freeimage:3.19.0:*:*:*:*:*:*:*","matchCriteriaId":"63EC5C7E-8EF9-4AD3-ABF1-2E63313B764C"}]}]}],"references":[{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFRQ76ZDPSWT7OH6FJDLSFWBXVBE6JDN/","source":"cve@mitre.org"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6GKMK74POW3RU7F4HLUJE7XEFLQDO35/","source":"cve@mitre.org"},{"url":"https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HFRQ76ZDPSWT7OH6FJDLSFWBXVBE6JDN/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6GKMK74POW3RU7F4HLUJE7XEFLQDO35/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://sourceforge.net/p/freeimage/discussion/36111/thread/afb98701eb/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}}]}