Show filters
34 Total Results
Displaying 1-10 of 34
Sort by:
Attacker Value
Unknown
CVE-2025-1007
Disclosure Date: February 19, 2025 (last updated February 19, 2025)
In OpenVSX version v0.9.0 to v0.20.0, the
/user/namespace/{namespace}/details API allows a user to edit all
namespace details, even if the user is not a namespace Owner or
Contributor. The details include: name, description, website, support
link and social media links. The same issues existed in
/user/namespace/{namespace}/details/logo and allowed a user to change
the logo.
0
Attacker Value
Unknown
CVE-2023-3966
Disclosure Date: February 22, 2024 (last updated February 23, 2024)
A flaw was found in Open vSwitch where multiple versions are vulnerable to crafted Geneve packets, which may result in a denial of service and invalid memory accesses. Triggering this issue requires that hardware offloading via the netlink path is enabled.
0
Attacker Value
Unknown
CVE-2024-22563
Disclosure Date: January 19, 2024 (last updated January 26, 2024)
openvswitch 2.17.8 was discovered to contain a memory leak via the function xmalloc__ in openvswitch-2.17.8/lib/util.c.
0
Attacker Value
Unknown
CVE-2023-5366
Disclosure Date: October 06, 2023 (last updated October 13, 2023)
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
0
Attacker Value
Unknown
CVE-2022-47071
Disclosure Date: February 06, 2023 (last updated October 08, 2023)
In NVS365 V01, the background network test function can trigger command execution.
0
Attacker Value
Unknown
CVE-2022-47070
Disclosure Date: February 03, 2023 (last updated October 08, 2023)
NVS365 V01 is vulnerable to Incorrect Access Control. After entering a wrong password, the url will be sent to the server twice. In the second package, the server will return the correct password information.
0
Attacker Value
Unknown
CVE-2022-4338
Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
0
Attacker Value
Unknown
CVE-2022-4337
Disclosure Date: January 10, 2023 (last updated October 08, 2023)
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
0
Attacker Value
Unknown
CVE-2019-25076
Disclosure Date: September 08, 2022 (last updated October 08, 2023)
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
0
Attacker Value
Unknown
CVE-2022-0669
Disclosure Date: August 29, 2022 (last updated October 08, 2023)
A flaw was found in dpdk. This flaw allows a malicious vhost-user master to attach an unexpected number of fds as ancillary data to VHOST_USER_GET_INFLIGHT_FD / VHOST_USER_SET_INFLIGHT_FD messages that are not closed by the vhost-user slave. By sending such messages continuously, the vhost-user master exhausts available fd in the vhost-user slave process, leading to a denial of service.
0