Page 2 of 17 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

24 Apr 2017 — StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. StreamCorruptedException y NullPointerException en OpenDaylight odl-mdsal-xsql. • https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

24 Apr 2017 — DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. DOMRpcImplementationNotAvailableException al enviar paquetes Port-Status a OpenDaylight. • https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

24 Apr 2017 — Java out of memory error and significant increase in resource consumption. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. Error de falta de memoria en Java y aumento significativo en el consumo de recursos. Componente: OpenDaylight odl-mdsal-xsql es vulnerable a este fallo. • https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

04 Apr 2017 — OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to the reuse of LLDP packets, aka "LLDP Relay." Plugin OpenFlow para OpenDaylight en versiones anteriores a Helium SR3 permite a atacantes remotos falsificar la topología SDN y afectar al flujo de datos, relacionados con la reutilización de los paquetes LLDP, también conocido como "LLDP Relay". • http://www.internetsociety.org/sites/default/files/10_4_2.pdf • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

04 Apr 2017 — OpenFlow plugin for OpenDaylight before Helium SR3 allows remote attackers to spoof the SDN topology and affect the flow of data, related to "fake LLDP injection." Plugin OpenFlow para OpenDaylight en versiones anteriores a Helium SR3 permite a atacantes remotos falsificar la topología SDN y afectar al flujo de datos, relacionados con "falsa inyección LLDP". • http://www.internetsociety.org/sites/default/files/10_4_2.pdf • CWE-20: Improper Input Validation •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

20 Mar 2017 — hosttracker in OpenDaylight l2switch allows remote attackers to change the host location information by spoofing the MAC address, aka "topology spoofing." hosttracker en OpenDaylight l2switch permite a atacantes remotos cambiar la información de ubicación del anfitrión suplantando la dirección MAC, vulnerabilidad también conocida como "topology spoofing". • http://www.internetsociety.org/sites/default/files/10_4_2.pdf • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Aug 2014 — The Netconf (TCP) service in OpenDaylight 1.0 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference in an XML-RPC message, related to an XML External Entity (XXE) issue. El servicio Netconf (TCP) en OpenDaylight 1.0 permite a atacantes remotos leer ficheros arbitrarios a través de una declaración de entidad externa XML en conjunto con una referencia de entidad en un mensaje XML-RPC, relacionado con un problema de entidad externa XML (X... • http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html •