Количество 6
Количество 6
CVE-2021-41689
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
CVE-2021-41689
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
CVE-2021-41689
DCMTK through 3.6.6 does not handle string copy properly. Sending spec ...
GHSA-558h-5pv9-xxg9
DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack.
BDU:2025-03977
Уязвимость библиотеки для работы с форматом DICOM DCMTK, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20210716-02
Множественные уязвимости dcmtk
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2021-41689 DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-41689 DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
CVE-2021-41689 DCMTK through 3.6.6 does not handle string copy properly. Sending spec ... | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
GHSA-558h-5pv9-xxg9 DCMTK through 3.6.6 does not handle string copy properly. Sending specific requests to the dcmqrdb program, it would query its database and copy the result even if the result is null, which can incur a head-based overflow. An attacker can use it to launch a DoS attack. | CVSS3: 7.5 | 0% Низкий | больше 3 лет назад | |
BDU:2025-03977 Уязвимость библиотеки для работы с форматом DICOM DCMTK, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 4 лет назад | |
ROS-20210716-02 Множественные уязвимости dcmtk | CVSS3: 7.5 | больше 4 лет назад |
Уязвимостей на страницу