Логотип exploitDog
bind:CVE-2014-9297
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2014-9297

Количество 10

Количество 10

ubuntu логотип

CVE-2014-9297

около 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

EPSS: Низкий
redhat логотип

CVE-2014-9297

почти 11 лет назад

A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.

CVSS2: 2.6
EPSS: Низкий
nvd логотип

CVE-2014-9297

около 10 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0274-1

почти 11 лет назад

Security update for ntp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0259-2

почти 13 лет назад

Recommended update for ntp

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1459

больше 10 лет назад

ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-2231

почти 10 лет назад

ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1173-1

почти 11 лет назад

Recommended update for ntp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0259-3

больше 11 лет назад

Security update for ntp

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0259-1

почти 11 лет назад

Recommended update for ntp

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2014-9297

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

около 10 лет назад
redhat логотип
CVE-2014-9297

A stack-based buffer overflow was found in the way the NTP autokey protocol was implemented. When an NTP client decrypted a secret received from an NTP server, it could cause that client to crash.

CVSS2: 2.6
почти 11 лет назад
nvd логотип
CVE-2014-9297

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-9750, CVE-2014-9751. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0274-1

Security update for ntp

почти 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0259-2

Recommended update for ntp

почти 13 лет назад
oracle-oval логотип
ELSA-2015-1459

ELSA-2015-1459: ntp security, bug fix, and enhancement update (MODERATE)

больше 10 лет назад
oracle-oval логотип
ELSA-2015-2231

ELSA-2015-2231: ntp security, bug fix, and enhancement update (MODERATE)

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1173-1

Recommended update for ntp

почти 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0259-3

Security update for ntp

больше 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0259-1

Recommended update for ntp

почти 11 лет назад

Уязвимостей на страницу