CVE-2018-13281
- EPSS 0.13%
- Veröffentlicht 31.10.2018 16:29:00
- Zuletzt bearbeitet 14.01.2025 19:29:55
Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.
CVE-2018-8897
- EPSS 23.21%
- Veröffentlicht 08.05.2018 18:29:00
- Zuletzt bearbeitet 21.11.2024 04:14:33
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that ...
CVE-2018-7170
- EPSS 1.01%
- Veröffentlicht 06.03.2018 20:29:01
- Zuletzt bearbeitet 14.01.2025 19:29:55
ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sy...
CVE-2018-7184
- EPSS 6.02%
- Veröffentlicht 06.03.2018 20:29:01
- Zuletzt bearbeitet 14.01.2025 19:29:55
ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset ...
CVE-2018-7185
- EPSS 16.93%
- Veröffentlicht 06.03.2018 20:29:01
- Zuletzt bearbeitet 14.01.2025 19:29:55
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association ...
CVE-2017-5753
- EPSS 94.33%
- Veröffentlicht 04.01.2018 13:29:00
- Zuletzt bearbeitet 14.01.2025 19:29:55
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.