- Description
- A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". An unauthenticated remote attacker can exploit it to download arbitrary files on the disk drive where the application is installed.
- Source
- vulnreport@tenable.com
- NVD status
- Analyzed
- Products
- sante_pacs_server
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
- Hype score
- Not currently trending
ペネトレーションテストツールMetasploitが大規模更新。Erlang/OTP SSHのCVE-2025-32433やSante PACS ServerのCVE-2025-2264に対応する攻撃コード、OPNSenseファイアウォールへの総当りログインスキャナ、SMB-to-HTTPリレー攻撃の追
@__kokumoto
12 May 2025
5182 Impressions
23 Retweets
89 Likes
46 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-2264 - high 🚨 Sante PACS Server.exe - Path Traversal Information Disclosure > A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.ex... 👾 https://t.co/Oyh0peMlOK @pdnuclei #NucleiTemplates #cve
@pdnuclei_bot
10 Apr 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 Sante PACS Server, Path Traversal Information Disclosure, #CVE-2025-2264 (Critical) https://t.co/wURqB3U7ON
@dailycve
3 Apr 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-2264 🔴 HIGH (7.5) 🏢 Santesoft - Sante PACS Server 🏗️ 4.1.0 🔗 https://t.co/fZ935whPFV #CyberCron #VulnAlert #InfoSec https://t.co/4JNA7h0PGm
@cybercronai
15 Mar 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-2264 A Path Traversal Information Disclosure vulnerability exists in "Sante PACS Server.exe". An unauthenticated remote attacker can exploit it to download arbitrary files o… https://t.co/paZ0rxN2Mp
@CVEnew
13 Mar 2025
116 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:santesoft:sante_pacs_server:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "94D12F49-C02A-4B31-B215-387260205DB3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]