all InfoSec news
CVE-2023-3892 (assistant, client)
Sept. 19, 2023, 3:15 p.m. |
National Vulnerability Database web.nvd.nist.gov
In order to take advantage of this vulnerability, an attacker must
craft a malicious XML document, embed this document into specific 3rd
party private RTst metadata tags, transfer the now compromised
DICOM object to MIM, and force MIM to archive and load the data.
Users on either version are strongly encouraged to update to …
assistant attacker client compromised cve dicom document entities external malicious metadata mim modules order party private reference tags transfer vulnerability xml
More from web.nvd.nist.gov / National Vulnerability Database
CVE-2023-45955 (lightstrip_firmware)
6 months, 1 week ago |
web.nvd.nist.gov
CVE-2023-21380 (android)
6 months, 1 week ago |
web.nvd.nist.gov
CVE-2023-21381 (android)
6 months, 1 week ago |
web.nvd.nist.gov
CVE-2023-21385 (android)
6 months, 1 week ago |
web.nvd.nist.gov
Jobs in InfoSec / Cybersecurity
Cyber Security Analyst
@ Dane Street | Palm Beach Gardens, Florida, United States
Program Information System Security Manager (ISSM) - onsite Tucson, AZ - TOP SECRET required
@ RTX | AZ855: RMS AP Bldg M05 1151 East Hermans Road Building M05, Tucson, AZ, 85756 USA
Lead - Business System Service (Workday HR Functional Consultant)
@ Freshworks | Bengaluru, India
Cloud Security Engineer
@ ButterflyMX | United States - Remote
Compliance Specialist
@ Airtable | Austin, Texas or San Francisco, California
Cyber SCRM Cloud Assessor Lead
@ Accenture Federal Services | Arlington, VA