Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 02 Jan 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Malaterre
Malaterre grassroots Dicom |
|
| Weaknesses | CWE-125 | |
| CPEs | cpe:2.3:a:malaterre:grassroots_dicom:3.0.24:*:*:*:*:*:*:* | |
| Vendors & Products |
Malaterre
Malaterre grassroots Dicom |
Wed, 17 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Grassroots Dicom Project
Grassroots Dicom Project grassroots Dicom |
|
| Vendors & Products |
Grassroots Dicom Project
Grassroots Dicom Project grassroots Dicom |
Tue, 16 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An out-of-bounds read vulnerability exists in the JPEGBITSCodec::InternalCode functionality of Grassroot DICOM 3.024. A specially crafted DICOM file can lead to an information leak. An attacker can provide a malicious file to trigger this vulnerability.The function `null_convert` is called based of the value of the malicious DICOM file specifying the intended interpretation of the image pixel data | |
| Weaknesses | CWE-119 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-12-17T18:49:53.333Z
Reserved: 2025-07-07T08:19:31.284Z
Link: CVE-2025-53619
Updated: 2025-12-17T15:34:53.558Z
Status : Analyzed
Published: 2025-12-16T22:15:47.827
Modified: 2026-01-02T14:57:53.010
Link: CVE-2025-53619
No data.
OpenCVE Enrichment
Updated: 2025-12-17T14:28:56Z