{"uuid": "d7fa8dc7-3c20-4a9d-8ba2-078a106d96f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-24794", "type": "seen", "source": "https://t.me/arpsyndicate/3796", "content": "#ExploitObserverAlert\n\nCVE-2024-24794\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-24794. A use-after-free vulnerability exists in the DICOM Element Parsing as implemented in Imaging Data Commons libdicom 1.0.5. A specially crafted DICOM file can cause premature freeing of memory that is used later. To trigger this vulnerability, an attacker would need to induce the vulnerable application to process a malicious DICOM image.The Use-After-Free happens in the `parse_meta_sequence_end()` parsing the Sequence Value Represenations.\n\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2024-02-21T14:11:15.000000Z"}