Show filters
20 Total Results
Displaying 1-10 of 20
Sort by:
Attacker Value
Unknown

CVE-2023-45811

Disclosure Date: October 17, 2023 (last updated October 26, 2023)
Synchrony deobfuscator is a javascript cleaner & deobfuscator. A `__proto__` pollution vulnerability exists in versions before v2.4.4. Successful exploitation could lead to arbitrary code execution. A `__proto__` pollution vulnerability exists in the `LiteralMap` transformer allowing crafted input to modify properties in the Object prototype. A fix has been released in `deobfuscator@2.4.4`. Users are advised to upgrade. Users unable to upgrade should launch node with the [--disable-proto=delete][disable-proto] or [--disable-proto=throw][disable-proto] flags
Attacker Value
Unknown

CVE-2020-14367

Disclosure Date: August 24, 2020 (last updated February 22, 2025)
A flaw was found in chrony versions before 3.5.1 when creating the PID file under the /var/run/chrony folder. The file is created during chronyd startup while still running as the root user, and when it's opened for writing, chronyd does not check for an existing symbolic link with the same file name. This flaw allows an attacker with privileged access to create a symlink with the default PID file name pointing to any destination file in the system, resulting in data loss and a denial of service due to the path traversal.
Attacker Value
Unknown

CVE-2015-1853

Disclosure Date: December 09, 2019 (last updated November 27, 2024)
chrony before 1.31.1 does not properly protect state variables in authenticated symmetric NTP associations, which allows remote attackers with knowledge of NTP peering to cause a denial of service (inability to synchronize) via random timestamps in crafted NTP data packets.
Attacker Value
Unknown

CVE-2014-0021

Disclosure Date: November 15, 2019 (last updated November 27, 2024)
Chrony before 1.29.1 has traffic amplification in cmdmon protocol
Attacker Value
Unknown

CVE-2018-11078

Disclosure Date: September 11, 2018 (last updated November 27, 2024)
Dell EMC VPlex GeoSynchrony, versions prior to 6.1, contains an Insecure File Permissions vulnerability. A remote authenticated malicious user could read from VPN configuration files on and potentially author a MITM attack on the VPN traffic.
0
Attacker Value
Unknown

CVE-2016-1567

Disclosure Date: January 26, 2016 (last updated November 25, 2024)
chrony before 1.31.2 and 2.x before 2.2.1 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
0
Attacker Value
Unknown

CVE-2015-6850

Disclosure Date: December 28, 2015 (last updated November 25, 2024)
EMC VPLEX GeoSynchrony 5.4 SP1 before P3 and 5.5 before Patch 1 has a default password for the root account, which allows local users to gain privileges by leveraging a login session.
0
Attacker Value
Unknown

CVE-2015-6847

Disclosure Date: November 18, 2015 (last updated October 05, 2023)
The default configuration of EMC VPLEX GeoSynchrony 5.4 SP1 before P3 stores cleartext NAVISPHERE GUI passwords in a log file, which allows local users to obtain sensitive information by reading this file.
0
Attacker Value
Unknown

CVE-2015-1821

Disclosure Date: April 16, 2015 (last updated October 05, 2023)
Heap-based buffer overflow in chrony before 1.31.1 allows remote authenticated users to cause a denial of service (chronyd crash) or possibly execute arbitrary code by configuring the (1) NTP or (2) cmdmon access with a subnet size that is indivisible by four and an address with a nonzero bit in the subnet remainder.
0
Attacker Value
Unknown

CVE-2015-1822

Disclosure Date: April 16, 2015 (last updated October 05, 2023)
chrony before 1.31.1 does not initialize the last "next" pointer when saving unacknowledged replies to command requests, which allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and daemon crash) or possibly execute arbitrary code via a large number of command requests.
0