Количество 10
Количество 10
CVE-2014-9297
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
CVE-2014-9297
A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.
CVE-2014-9297
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage
SUSE-SU-2015:0274-1
Security update for ntp
SUSE-SU-2015:0259-2
Recommended update for ntp
ELSA-2015-1459
ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE)
ELSA-2015-2231
ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE)
SUSE-SU-2015:1173-1
Recommended update for ntp
SUSE-SU-2015:0259-3
Security update for ntp
SUSE-SU-2015:0259-1
Recommended update for ntp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2014-9297 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage | около 10 лет назад | |||
CVE-2014-9297 A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash. | CVSS2: 2.6 | почти 11 лет назад | ||
CVE-2014-9297 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage | около 10 лет назад | |||
SUSE-SU-2015:0274-1 Security update for ntp | почти 11 лет назад | |||
SUSE-SU-2015:0259-2 Recommended update for ntp | почти 13 лет назад | |||
ELSA-2015-1459 ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE) | больше 10 лет назад | |||
ELSA-2015-2231 ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE) | почти 10 лет назад | |||
SUSE-SU-2015:1173-1 Recommended update for ntp | почти 11 лет назад | |||
SUSE-SU-2015:0259-3 Security update for ntp | больше 11 лет назад | |||
SUSE-SU-2015:0259-1 Recommended update for ntp | почти 11 лет назад |
Уязвимостей на страницу