CVE-2025-67111
- EPSS 0.06%
- Veröffentlicht 23.12.2025 16:16:23
- Zuletzt bearbeitet 06.01.2026 17:41:11
An integer overflow in the RTPS protocol implementation of OpenDDS DDS before v3.33.0 allows attackers to cause a Denial of Service (DoS) via a crafted message.
CVE-2024-30915
- EPSS 0.09%
- Veröffentlicht 11.04.2024 06:15:06
- Zuletzt bearbeitet 17.06.2025 20:51:29
An issue was discovered in OpenDDS commit b1c534032bb62ad4ae32609778de6b8d6c823a66, allows a local attacker to cause a denial of service and obtain sensitive information via the max_samples parameter within the DataReaderQoS component.
CVE-2023-52427
- EPSS 0.06%
- Veröffentlicht 11.02.2024 04:15:08
- Zuletzt bearbeitet 21.11.2024 08:39:43
In OpenDDS through 3.27, there is a segmentation fault for a DataWriter with a large value of resource_limits.max_samples. NOTE: the vendor's position is that the product is not designed to handle a max_samples value that is too large for the amount ...
CVE-2023-37915
- EPSS 0.24%
- Veröffentlicht 21.07.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 08:12:27
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS crashes while parsing a malformed `PID_PROPERTY_LIST` in a DATA submessage during participant discovery. Attackers can remotely...
CVE-2023-23932
- EPSS 0.41%
- Veröffentlicht 03.02.2023 21:15:11
- Zuletzt bearbeitet 21.11.2024 07:47:07
OpenDDS is an open source C++ implementation of the Object Management Group (OMG) Data Distribution Service (DDS). OpenDDS applications that are exposed to untrusted RTPS network traffic may crash when parsing badly-formed input. This issue has been ...
CVE-2021-38429
- EPSS 0.06%
- Veröffentlicht 05.05.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:17:04
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition and information exposure.
CVE-2021-38445
- EPSS 0.7%
- Veröffentlicht 05.05.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:17:07
OCI OpenDDS versions prior to 3.18.1 do not handle a length parameter consistent with the actual length of the associated data, which may allow an attacker to remotely execute arbitrary code.
CVE-2021-38447
- EPSS 0.1%
- Veröffentlicht 05.05.2022 17:15:09
- Zuletzt bearbeitet 21.11.2024 06:17:07
OCI OpenDDS versions prior to 3.18.1 are vulnerable when an attacker sends a specially crafted packet to flood target devices with unwanted traffic, which may result in a denial-of-service condition.