An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
{ "binaries": [ { "binary_version": "3.0-2", "binary_name": "invesalius" }, { "binary_version": "3.0-2", "binary_name": "invesalius-bin" }, { "binary_version": "3.0-2", "binary_name": "invesalius-examples" } ] }
{ "binaries": [ { "binary_version": "3.1.1-3", "binary_name": "invesalius" }, { "binary_version": "3.1.1-3", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.1-3", "binary_name": "invesalius-examples" } ] }
{ "binaries": [ { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius" }, { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.99992-3build2", "binary_name": "invesalius-examples" } ] }
{ "binaries": [ { "binary_version": "3.1.99998-7", "binary_name": "invesalius" }, { "binary_version": "3.1.99998-7", "binary_name": "invesalius-bin" }, { "binary_version": "3.1.99998-7", "binary_name": "invesalius-examples" } ] }