Synology

Skynas

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 31.10.2018 16:29:00
  • Zuletzt bearbeitet 14.01.2025 19:29:55

Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.

Exploit
  • EPSS 23.21%
  • Veröffentlicht 08.05.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:14:33

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that ...

  • EPSS 1.01%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 14.01.2025 19:29:55

ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sy...

  • EPSS 6.02%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 14.01.2025 19:29:55

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset ...

  • EPSS 16.93%
  • Veröffentlicht 06.03.2018 20:29:01
  • Zuletzt bearbeitet 14.01.2025 19:29:55

The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association ...

Exploit
  • EPSS 94.33%
  • Veröffentlicht 04.01.2018 13:29:00
  • Zuletzt bearbeitet 14.01.2025 19:29:55

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.