Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-42845 PoC — InVesalius 安全漏洞

Source
Associated Vulnerability
Title:InVesalius 安全漏洞 (CVE-2024-42845)
Description:An eval Injection vulnerability in the component invesalius/reader/dicom.py of InVesalius 3.1.99991 through 3.1.99998 allows attackers to execute arbitrary code via loading a crafted DICOM file.
Description
InVesalius discovered CVE. CVE-2024-42845
Readme
# invesalius3_vulnerabilities

## Intro

The https://github.com/invesalius/invesalius3 is the reference, an Open Source Project.

## Structure

Every vulnerability will have the following structure:
```
folder/
|_README.md
|_subfolder/
  |_artifacts
```
named as ```[CVE-ID]``` if a ID is assigned or as ```[VULN-NAME]``` or ```[TMP-{N}]``` if no ID is assigned.

Every ```folder/``` will have the contributors stated in ```README.md``` file.

## At the moment

POC available:

+ CVE-2024-42845
+ [partwave CVE-2024-42845](https://www.partywave.site/show/research/Tic%20TAC%20-%20Beware%20of%20your%20scan)
File Snapshot

[4.0K] /data/pocs/72498e44ec292e8963bb46d561e8d1e8ace07619 ├── [4.0K] CVE-2024-42845 │   ├── [2.1K] exploit.py │   ├── [2.0K] README.md │   └── [4.0K] res │   ├── [514K] MRBRAIN.DCM │   ├── [ 470] rev_1.py │   └── [1.1K] rev_2.py └── [ 607] README.md 2 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →