Executive Summary

Informations
Name CVE-2024-25386 First vendor Publication 2024-03-01
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Directory Traversal vulnerability in DICOMĀ® Connectivity Framework by laurelbridge before v.2.7.6b allows a remote attacker to execute arbitrary code via the format_logfile.pl file.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25386

Sources (Detail)

https://gist.github.com/Shulelk/15c9ba8d6b54dd4256a50a24ac7dd0a2
https://laurelbridge.com/security-notice-cve-2024-25386-potential-vulnerability/
https://sec.1i6w31fen9.top/2024/02/02/dcf-operations-window-remote-command-ex...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2024-11-25 09:26:39
  • Multiple Updates
2024-08-16 21:27:53
  • Multiple Updates
2024-03-13 09:27:23
  • Multiple Updates
2024-03-02 02:43:00
  • Multiple Updates
2024-03-02 02:42:59
  • Multiple Updates
2024-03-01 17:27:25
  • Multiple Updates
2024-03-01 13:27:26
  • First insertion