
CVE-2022-45930
https://notcve.org/view.php?id=CVE-2022-45930
27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain function is affected for the /auth/v1/domains/ API interface. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/DomainStore.java deleteDomain se ve afectada para la interfaz API /auth/v1/domains/. • https://git.opendaylight.org/gerrit/c/aaa/+/103242 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-45931
https://notcve.org/view.php?id=CVE-2022-45931
27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser function is affected when the API interface /auth/v1/users/ is used. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/UserStore.java deleteUser se ve afectada cuando se utiliza la interfaz API /auth/v1/users/. • https://git.opendaylight.org/gerrit/c/aaa/+/103243 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-45932
https://notcve.org/view.php?id=CVE-2022-45932
27 Nov 2022 — A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used. Se descubrió un problema de inyección SQL en AAA en OpenDaylight (ODL) anterior a 0.16.5. La función aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole se ve afectada cuando se utiliza la interfaz API /auth/v1/roles/. • https://git.opendaylight.org/gerrit/c/aaa/+/103241 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-45907
https://notcve.org/view.php?id=CVE-2022-45907
26 Nov 2022 — In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. En PyTorch anterior a trunk/89695, torch.jit.annotations.parse_type_line puede causar la ejecución de código arbitrario porque eval se usa de manera insegura. • https://github.com/pytorch/pytorch/commit/767f6aa49fe20a2766b9843d01e3b7f7793df6a3 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2022-41939 – Credential exposure when running third-party builders in knative/func
https://notcve.org/view.php?id=CVE-2022-41939
19 Nov 2022 — knative.dev/func is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious `lifecycle` container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid `lifecycle... • https://github.com/knative/func/blob/5ca77d38744d3481cc0b795f607c5859b19588fc/buildpacks/builder.go#L37-L41 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2022-39383 – SSRF vulnerability in KubeVela VelaUX APIServer
https://notcve.org/view.php?id=CVE-2022-39383
16 Nov 2022 — KubeVela is an open source application delivery platform. Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. Users who're using v1.6, please update the v1.6.1. Users who're using v1.5, please update the v1.5.8. • https://github.com/kubevela/kubevela/pull/5000 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2022-0324 – Buffer Overflow in Dhcp6relay in Software for Open Networking in the Cloud (SONiC)
https://notcve.org/view.php?id=CVE-2022-0324
14 Nov 2022 — There is a vulnerability in DHCPv6 packet parsing code that could be explored by remote attacker to craft a packet that could cause buffer overflow in a memcpy call, leading to out-of-bounds memory write that would cause dhcp6relay to crash. Dhcp6relay is a critical process and could cause dhcp relay docker to shutdown. Discovered by Eugene Lim of GovTech Singapore. Existe una vulnerabilidad en el código de análisis de paquetes DHCPv6 que un atacante remoto podría explorar para crear un paquete que podría p... • https://github.com/sonic-net/sonic-buildimage/security/advisories/GHSA-m4qf-8rrq-mph9 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') CWE-787: Out-of-bounds Write •

CVE-2022-32589
https://notcve.org/view.php?id=CVE-2022-32589
07 Oct 2022 — In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. En Wi-Fi driver, se presenta una posible forma de desconectar el Wi-Fi debido a una liberación inapropiada de recursos. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-404: Improper Resource Shutdown or Release •

CVE-2022-26475
https://notcve.org/view.php?id=CVE-2022-26475
07 Oct 2022 — In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743. En wlan, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-787: Out-of-bounds Write •

CVE-2022-32590
https://notcve.org/view.php?id=CVE-2022-32590
07 Oct 2022 — In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425. En wlan, se presenta un posible uso después de libre debido a una comprobación de estado incorrecta. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-754: Improper Check for Unusual or Exceptional Conditions •