{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T00:17:00.976","vulnerabilities":[{"cve":{"id":"CVE-2026-22801","sourceIdentifier":"security-advisories@github.com","published":"2026-01-12T23:15:52.907","lastModified":"2026-01-21T18:58:18.270","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54."},{"lang":"es","value":"LIBPNG es una biblioteca de referencia para usar en aplicaciones que leen, crean y manipulan archivos de imagen ráster PNG (Portable Network Graphics). Desde la versión 1.6.26 hasta la 1.6.53, existe un truncamiento de enteros en las funciones API de escritura simplificadas de libpng, png_write_image_16bit y png_write_image_8bit, que causa una lectura excesiva del búfer de la pila (heap buffer over-read) cuando el llamador proporciona un paso de fila negativo (para diseños de imagen de abajo hacia arriba) o un paso que excede los 65535 bytes. El error fue introducido en libpng 1.6.26 (octubre de 2016) por conversiones de tipo añadidas para silenciar advertencias del compilador en sistemas de 16 bits. Esta vulnerabilidad está corregida en la versión 1.6.54."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-125"},{"lang":"en","value":"CWE-190"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*","versionStartIncluding":"1.6.26","versionEndExcluding":"1.6.54","matchCriteriaId":"4E5664F6-3EA2-4459-8380-BEB9937EFBE1"}]}]}],"references":[{"url":"https://github.com/pnggroup/libpng/security/advisories/GHSA-vgjq-8cw5-ggw8","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}