Filtered by vendor Objectcomputing Subscriptions
Filtered by product Opendds Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-38445 1 Objectcomputing 1 Opendds 2025-04-16 7 High
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
CVE-2021-38447 1 Objectcomputing 1 Opendds 2025-04-16 8.6 High
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.
CVE-2021-38429 1 Objectcomputing 1 Opendds 2025-04-16 6.6 Medium
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.
CVE-2024-30915 1 Objectcomputing 1 Opendds 2025-03-25 4.3 Medium
An issue was discovered in OpenDDS commit b1c534032bb62ad4ae32609778de6b8d6c823a66, allows a local attacker to cause a denial of service and obtain sensitive information via the max_samples parameter within the DataReaderQoS component.
CVE-2023-23932 1 Objectcomputing 1 Opendds 2025-03-10 5.3 Medium
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been patched in version 3.23.1.
CVE-2023-52427 1 Objectcomputing 1 Opendds 2024-11-21 7.5 High
In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount of memory on the system.
CVE-2023-37915 1 Objectcomputing 1 Opendds 2024-11-21 7.5 High
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely crash OpenDDS processes by sending a DATA submessage containing the malformed parameter to the known multicast port. This issue has been addressed in version 3.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.