Directory Traversal vulnerability in DICOM® Connectivity Framework by laurelbridge before v.2.7.6b allows a remote attacker to execute arbitrary code via the format_logfile.pl file.
References
Configurations
No configuration.
History
21 Nov 2024, 09:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2 - | |
References | () https://laurelbridge.com/security-notice-cve-2024-25386-potential-vulnerability/ - | |
References | () https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-execute/ - |
16 Aug 2024, 17:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
13 Mar 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2024, 14:04
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Mar 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-01 06:15
Updated : 2024-11-21 09:00
NVD link : CVE-2024-25386
Mitre link : CVE-2024-25386
CVE.ORG link : CVE-2024-25386
JSON object : View
Products Affected
No product.
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')