Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 21 Nov 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rainbowfishsoftware:pacsone_server:6.6.2:*:*:*:*:*:*:* |
Thu, 20 Nov 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC. | PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-02 UTC. |
Wed, 12 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Nov 2025 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rainbowfishsoftware
Rainbowfishsoftware pacsone Server |
|
| Vendors & Products |
Rainbowfishsoftware
Rainbowfishsoftware pacsone Server |
Mon, 10 Nov 2025 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PacsOne Server version 6.6.2 (prior versions are likely affected) contains a directory traversal vulnerability within the web-based DICOM viewer component. Successful exploitation allows a remote unauthenticated attacker to read arbitrary files via the 'nocache.php' endpoint with a crafted 'path' parameter. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-07 UTC. | |
| Title | PacsOne Server 6.6.2 DICOM Web Viewer Directory Traversal LFI | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:03:47.357Z
Reserved: 2025-10-29T21:01:03.317Z
Link: CVE-2018-25124
Updated: 2025-11-12T17:33:55.739Z
Status : Deferred
Published: 2025-11-10T23:15:39.840
Modified: 2026-04-15T00:35:42.020
Link: CVE-2018-25124
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:48:10Z