Логотип exploitDog
bind:CVE-2023-33255
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-33255

Количество 2

Количество 2

nvd логотип

CVE-2023-33255

больше 2 лет назад

An issue was discovered in Papaya Viewer 1.0.1449. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application.

CVSS3: 6.1
EPSS: Низкий
github логотип

GHSA-f52f-87gv-xwq9

больше 2 лет назад

An issue was discovered in Papaya Viewer 4a42701. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application

CVSS3: 6.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-33255

An issue was discovered in Papaya Viewer 1.0.1449. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application.

CVSS3: 6.1
1%
Низкий
больше 2 лет назад
github логотип
GHSA-f52f-87gv-xwq9

An issue was discovered in Papaya Viewer 4a42701. User-supplied input in form of DICOM or NIFTI images can be loaded into the Papaya web application without any kind of sanitization. This allows injection of arbitrary JavaScript code into image metadata, which is executed when that metadata is displayed in the Papaya web application

CVSS3: 6.1
1%
Низкий
больше 2 лет назад

Уязвимостей на страницу