Show filters
194 Total Results
Displaying 121-130 of 194
Sort by:
Attacker Value
Unknown
CVE-2018-19039
Disclosure Date: December 13, 2018 (last updated November 27, 2024)
Grafana before 4.6.5 and 5.x before 5.3.3 allows remote authenticated users to read arbitrary files by leveraging Editor or Admin permissions.
0
Attacker Value
Unknown
CVE-2018-13281
Disclosure Date: October 31, 2018 (last updated January 15, 2025)
Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.
0
Attacker Value
Unknown
CVE-2018-12099
Disclosure Date: June 11, 2018 (last updated November 26, 2024)
Grafana before 5.2.0-beta1 has XSS vulnerabilities in dashboard links.
0
Attacker Value
Unknown
CVE-2017-7639
Disclosure Date: June 05, 2018 (last updated November 26, 2024)
QNAP NAS application Proxy Server through version 1.2.0 does not authenticate requests properly. Successful exploitation can lead to change of the settings of Proxy Server.
0
Attacker Value
Unknown
CVE-2017-7635
Disclosure Date: June 05, 2018 (last updated November 26, 2024)
QNAP NAS application Proxy Server through version 1.2.0 does not utilize CSRF protections.
0
Attacker Value
Unknown
CVE-2017-7637
Disclosure Date: June 05, 2018 (last updated November 26, 2024)
QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to run arbitrary OS commands against the system with root privileges.
0
Attacker Value
Unknown
CVE-2017-7636
Disclosure Date: June 05, 2018 (last updated November 26, 2024)
Cross-site scripting (XSS) vulnerability in QNAP NAS application Proxy Server through version 1.2.0 allows remote attackers to inject arbitrary web script or HTML.
0
Attacker Value
Unknown
CVE-2018-8897
Disclosure Date: May 08, 2018 (last updated November 26, 2024)
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that tra…
0
Attacker Value
Unknown
CVE-2018-1183
Disclosure Date: April 30, 2018 (last updated November 26, 2024)
In Dell EMC Unisphere for VMAX Virtual Appliance versions prior to 8.4.0.8, Dell EMC Solutions Enabler Virtual Appliance versions prior to 8.4.0.8, Dell EMC VASA Provider Virtual Appliance versions prior to 8.4.0.512, Dell EMC SMIS versions prior to 8.4.0.6, Dell EMC VMAX Embedded Management (eManagement) versions prior to and including 1.4.0.347, Dell EMC VNX2 Operating Environment (OE) for File versions prior to 8.1.9.231, Dell EMC VNX2 Operating Environment (OE) for Block versions prior to 05.33.009.5.231, Dell EMC VNX1 Operating Environment (OE) for File versions prior to 7.1.82.0, Dell EMC VNX1 Operating Environment (OE) for Block versions prior to 05.32.000.5.225, Dell EMC VNXe3200 Operating Environment (OE) all versions, Dell EMC VNXe1600 Operating Environment (OE) versions prior to 3.1.9.9570228, Dell EMC VNXe 3100/3150/3300 Operating Environment (OE) all versions, Dell EMC ViPR SRM versions 3.7, 3.7.1, 3.7.2 (only if using Dell EMC Host Interface for Windows), Dell EMC ViPR S…
0
Attacker Value
Unknown
CVE-2018-7185
Disclosure Date: March 06, 2018 (last updated January 15, 2025)
The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association.
0