Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
medicomp medcin engine 2.22.20153.223 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2015-6006
The AddUserFinding implementation in Medicomp MEDCIN Engine 2.22.20153.x prior to 2.22.20153.226 might allow remote malicious users to execute arbitrary code or cause a denial of service (integer truncation and heap-based buffer overflow) via a crafted packet on port 8190.
Medicomp Medcin Engine 2.22.20153.223
1 Github repository
6.8
CVSSv2
CVE-2015-2898
Multiple stack-based buffer overflows in Medicomp MEDCIN Engine prior to 2.22.20153.226 might allow remote malicious users to execute arbitrary code via a crafted packet on port 8190, related to (1) the SetGroupSequenceEx na_setgroupsequenceex function, (2) the FormatDate julptos...
Medicomp Medcin Engine
1 Github repository
6.8
CVSSv2
CVE-2015-2899
Heap-based buffer overflow in the QualifierList retrieve_qualifier_list function in Medicomp MEDCIN Engine prior to 2.22.20153.226 might allow remote malicious users to execute arbitrary code via a long list name in a packet on port 8190.
Medicomp Medcin Engine
6.8
CVSSv2
CVE-2015-2900
The AddUserFinding add_userfinding2 function in Medicomp MEDCIN Engine prior to 2.22.20153.226 allows remote malicious users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted packet on port 8190.
Medicomp Medcin Engine
6.8
CVSSv2
CVE-2015-2901
Multiple stack-based buffer overflows in Medicomp MEDCIN Engine 2.22.20142.166 might allow remote malicious users to execute arbitrary code via a crafted packet on port 8190, related to (1) the GetProperty info_getproperty function and (2) the GetProperty UdfCodeList function.
Medicomp Medcin Engine 2.22.20142.166
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4367
CVE-2024-35977
CVE-2023-49335
man-in-the-middle
CVE-2024-4947
CVE-2024-31714
memory leak
SQL
CVE-2024-35994
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started