Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 16 Apr 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 CWE-789 |
Wed, 15 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc-server
Orthanc-server orthanc |
|
| Weaknesses | CWE-770 | |
| CPEs | cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Orthanc-server
Orthanc-server orthanc |
Wed, 15 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 CWE-789 |
Tue, 14 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Orthanc
Orthanc dicom Server |
|
| Vendors & Products |
Orthanc
Orthanc dicom Server |
Thu, 09 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A memory exhaustion vulnerability exists in ZIP archive processing. Orthanc automatically extracts ZIP archives uploaded to certain endpoints and trusts metadata fields describing the uncompressed size of archived files. An attacker can craft a small ZIP archive containing a forged size value, causing the server to allocate extremely large buffers during extraction. | |
| Title | Memory Exhaustion via Forged ZIP Metadata | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2026-04-14T16:34:14.439Z
Reserved: 2026-04-02T19:22:13.583Z
Link: CVE-2026-5439
Updated: 2026-04-14T15:15:08.031Z
Status : Analyzed
Published: 2026-04-09T15:16:15.443
Modified: 2026-04-15T19:32:22.333
Link: CVE-2026-5439
No data.
OpenCVE Enrichment
Updated: 2026-04-17T09:30:14Z