Page 15 of 306 results (0.007 seconds)

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain function is affected for the /auth/v1/domains/ API interface. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain se ve afectada para la interfaz API /auth/v1/domains/. • https://git.opendaylight.org/gerrit/c/aaa/+/103242 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser se ve afectada cuando se utiliza la interfaz API /auth/v1/users/. • https://git.opendaylight.org/gerrit/c/aaa/+/103243 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 1

27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole se ve afectada cuando se utiliza la interfaz API /auth/v1/roles/. • https://git.opendaylight.org/gerrit/c/aaa/+/103241 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

26 Nov 2022 — In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. En PyTorch anterior a trunk/89695, torch.jit.annotations.parse_type_line puede causar la ejecución de código arbitrario porque eval se usa de manera insegura. • https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

19 Nov 2022 — knative.dev/func is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious `lifecycle` container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid `lifecycle... • https://github.com/knative/func/blob/5ca77d38744d3481cc0b795f607c5859b19588fc/buildpacks/builder.go#L37-L41 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0

16 Nov 2022 — KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. • https://github.com/kubevela/kubevela/pull/5000 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

14 Nov 2022 — There is a vulnerability in DHCPv6 packet parsing code that could be explored by remote attacker to craft a packet that could cause buffer overflow in a memcpy call, leading to out-of-bounds memory write that would cause dhcp6relay to crash. Dhcp6relay is a critical process and could cause dhcp relay docker to shutdown. Discovered by Eugene Lim of GovTech Singapore. Existe una vulnerabilidad en el código de análisis de paquetes DHCPv6 que un atacante remoto podría explorar para crear un paquete que podría p... • https://github.com/sonic-net/sonic-buildimage/security/advisories/GHSA-m4qf-8rrq-mph9 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 1%CPEs: 45EXPL: 0

07 Oct 2022 — In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. En Wi-Fi driver, se presenta una posible forma de desconectar el Wi-Fi debido a una liberación inapropiada de recursos. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-404: Improper Resource Shutdown or Release •

CVSS: 6.7EPSS: 0%CPEs: 44EXPL: 0

07 Oct 2022 — In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743. En wlan, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-787: Out-of-bounds Write •

CVSS: 6.7EPSS: 0%CPEs: 49EXPL: 0

07 Oct 2022 — In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425. En wlan, se presenta un posible uso después de libre debido a una comprobación de estado incorrecta. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-754: Improper Check for Unusual or Exceptional Conditions •