An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.0-2" }, { "binary_name": "invesalius-bin", "binary_version": "3.0-2" }, { "binary_name": "invesalius-examples", "binary_version": "3.0-2" } ] }
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.1-3" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.1-3" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.1-3" } ] }
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.99992-3build2" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.99992-3build2" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.99992-3build2" } ] }
{ "binaries": [ { "binary_name": "invesalius", "binary_version": "3.1.99998-7" }, { "binary_name": "invesalius-bin", "binary_version": "3.1.99998-7" }, { "binary_name": "invesalius-examples", "binary_version": "3.1.99998-7" } ] }