Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
dicom dcmtk vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2015-8979
Stack-based buffer overflow in the parsePresentationContext function in storescp in DICOM dcmtk-3.6.0 and previous versions allows remote malicious users to cause a denial of service (segmentation fault) via a long string sent to TCP port 4242.
Debian Debian Linux 8.0
Dicom Dcmtk
294
VMScore
CVE-2022-2121
OFFIS DCMTK's (All versions before 3.6.7) has a NULL pointer dereference vulnerability while processing DICOM files, which may result in a denial-of-service condition.
Offis Dcmtk
668
VMScore
CVE-2022-2119
OFFIS DCMTK's (All versions before 3.6.7) service class provider (SCP) is vulnerable to path traversal, allowing an malicious user to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
Offis Dcmtk
668
VMScore
CVE-2022-2120
OFFIS DCMTK's (All versions before 3.6.7) service class user (SCU) is vulnerable to relative path traversal, allowing an malicious user to write DICOM files into arbitrary directories under controlled names. This could allow remote code execution.
Offis Dcmtk
668
VMScore
CVE-2019-1010228
OFFIS.de DCMTK 3.6.3 and below is affected by: Buffer Overflow. The impact is: Possible code execution and confirmed Denial of Service. The component is: DcmRLEDecoder::decompress() (file dcrledec.h, line 122). The attack vector is: Many scenarios of DICOM file processing (e.g. D...
Offis Dcmtk
Fedoraproject Fedora 29
Fedoraproject Fedora 30
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2024-5274
CVE-2020-17519
CVE-2024-35340
CVE-2021-47558
local
XML injection
CVE-2021-47519
CVE-2021-47543
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started