No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aces
Aces loris |
|
| Vendors & Products |
Aces
Aces loris |
|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections for the MRI feedback popup window of the imaging browser. Attackers can use SQL ingestion to access/alter data on the server. This vulnerability is fixed in 27.0.3 and 28.0.1. | |
| Title | LORIS has a SQL injection in MRI feedback popup | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-08T19:24:05.846Z
Reserved: 2026-03-18T22:15:11.814Z
Link: CVE-2026-33350
Updated: 2026-04-08T19:24:00.763Z
Status : Awaiting Analysis
Published: 2026-04-08T19:25:21.163
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-33350
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:12:45Z