Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dicom dcmtk vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2015-8979
Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.
Debian Debian Linux 8.0
Dicom Dcmtk
6.5
CVSSv3
CVE-2022-2121
OFFIS DCMTK's (All versions before 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.
Offis Dcmtk
9.8
CVSSv3
CVE-2022-2119
OFFIS DCMTK's (All versions before 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an malicious user to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
Offis Dcmtk
9.8
CVSSv3
CVE-2022-2120
OFFIS DCMTK's (All versions before 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an malicious user to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
Offis Dcmtk
9.8
CVSSv3
CVE-2019-1010228
OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. D...
Offis Dcmtk
Fedoraproject Fedora 29
Fedoraproject Fedora 30
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started