Page 2 of 8 results (0.002 seconds)

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 1

StreamCorruptedException and NullPointerException in OpenDaylight odl-mdsal-xsql. Controller launches exceptions in the console. Component: OpenDaylight odl-mdsal-xsql is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. StreamCorruptedException y NullPointerException en OpenDaylight odl-mdsal-xsql. • https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

DOMRpcImplementationNotAvailableException when sending Port-Status packets to OpenDaylight. Controller launches exceptions and consumes more CPU resources. Component: OpenDaylight is vulnerable to this flaw. Version: The tested versions are OpenDaylight 3.3 and 4.0. DOMRpcImplementationNotAvailableException al enviar paquetes Port-Status a OpenDaylight. • https://aaltodoc.aalto.fi/bitstream/handle/123456789/21584/master_Bidaj_Andi_2016.pdf •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

The Netconf (TCP) service in OpenDaylight 1.0 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference in an XML-RPC message, related to an XML External Entity (XXE) issue. El servicio Netconf (TCP) en OpenDaylight 1.0 permite a atacantes remotos leer ficheros arbitrarios a través de una declaración de entidad externa XML en conjunto con una referencia de entidad en un mensaje XML-RPC, relacionado con un problema de entidad externa XML (XXE). • http://packetstormsecurity.com/files/127843/Opendaylight-1.0-Local-File-Inclusion-Remote-File-Inclusion.html http://seclists.org/fulldisclosure/2014/Aug/34 http://www.securityfocus.com/archive/1/533114/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/95254 •