Количество 16
Количество 16
GHSA-gmx7-j3pp-2gxp
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
CVE-2018-12327
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
CVE-2018-12327
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
CVE-2018-12327
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source.
CVE-2018-12327
Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 ...
ELSA-2019-2077
ELSA-2019-2077: ntp security, bug fix, and enhancement update (LOW)
ELSA-2018-3854
ELSA-2018-3854: ntp security update (LOW)
BDU:2023-01499
Уязвимость реализации протокола синхронизации времени NTP межсетевого экрана Eltex «ESR-200», позволяющая нарушителю выполнить вредоносный код или повысить свои привилегии в системе
openSUSE-SU-2018:3452-1
Security update for ntp
openSUSE-SU-2018:3438-1
Security update for ntp
SUSE-SU-2018:3386-1
Security update for ntp
SUSE-SU-2018:3356-1
Security update for ntp
SUSE-SU-2018:3352-1
Security update for ntp
SUSE-SU-2018:3351-1
Security update for ntp
SUSE-SU-2018:3342-2
Security update for ntp
SUSE-SU-2018:3342-1
Security update for ntp
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
GHSA-gmx7-j3pp-2gxp Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. | CVSS3: 9.8 | 19% Средний | больше 3 лет назад | |
CVE-2018-12327 Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. | CVSS3: 9.8 | 19% Средний | больше 7 лет назад | |
CVE-2018-12327 Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. | CVSS3: 7 | 19% Средний | больше 7 лет назад | |
CVE-2018-12327 Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. | CVSS3: 9.8 | 19% Средний | больше 7 лет назад | |
CVE-2018-12327 Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 ... | CVSS3: 9.8 | 19% Средний | больше 7 лет назад | |
ELSA-2019-2077 ELSA-2019-2077: ntp security, bug fix, and enhancement update (LOW) | больше 6 лет назад | |||
ELSA-2018-3854 ELSA-2018-3854: ntp security update (LOW) | почти 7 лет назад | |||
BDU:2023-01499 Уязвимость реализации протокола синхронизации времени NTP межсетевого экрана Eltex «ESR-200», позволяющая нарушителю выполнить вредоносный код или повысить свои привилегии в системе | CVSS3: 7 | 19% Средний | около 3 лет назад | |
openSUSE-SU-2018:3452-1 Security update for ntp | около 7 лет назад | |||
openSUSE-SU-2018:3438-1 Security update for ntp | около 7 лет назад | |||
SUSE-SU-2018:3386-1 Security update for ntp | около 7 лет назад | |||
SUSE-SU-2018:3356-1 Security update for ntp | около 7 лет назад | |||
SUSE-SU-2018:3352-1 Security update for ntp | около 7 лет назад | |||
SUSE-SU-2018:3351-1 Security update for ntp | около 7 лет назад | |||
SUSE-SU-2018:3342-2 Security update for ntp | больше 6 лет назад | |||
SUSE-SU-2018:3342-1 Security update for ntp | около 7 лет назад |
Уязвимостей на страницу