{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T20:27:32.599","vulnerabilities":[{"cve":{"id":"CVE-2024-48514","sourceIdentifier":"cve@mitre.org","published":"2024-10-24T18:15:10.227","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"php-heic-to-jpg <= 1.0.5 is vulnerable to code injection (fixed in 1.0.6). An attacker who can upload heic images is able to execute code on the remote server via the file name. As a result, the CIA is no longer guaranteed. This affects php-heic-to-jpg 1.0.5 and below."},{"lang":"es","value":"php-heic-to-jpg &lt;= 1.0.5 es vulnerable a la ejecución remota de código. Un atacante que pueda cargar imágenes heic puede ejecutar código en el servidor remoto a través del nombre del archivo. Como resultado, la CIA ya no está garantizada. Esto afecta a php-heic-to-jpg 1.0.5 y versiones anteriores."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-94"}]}],"references":[{"url":"https://advisories.gitlab.com/pkg/composer/maestroerror/php-heic-to-jpg/CVE-2024-48514/","source":"cve@mitre.org"},{"url":"https://github.com/MaestroError/php-heic-to-jpg","source":"cve@mitre.org"},{"url":"https://github.com/advisories/GHSA-g8v9-c8m3-942v","source":"cve@mitre.org"},{"url":"https://github.com/marcoris/CVEs/tree/master/CVE-2024-48514","source":"cve@mitre.org"}]}}]}