Количество 4
Количество 4
CVE-2019-11331
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
CVE-2019-11331
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
GHSA-2c4g-qfqp-42mh
Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks.
BDU:2021-04789
Уязвимость протокола сетевого времени NTP, связанная с недостаточной защитой служебных данных, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-11331 Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks. | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад | |
CVE-2019-11331 Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks. | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад | |
GHSA-2c4g-qfqp-42mh Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks. | CVSS3: 8.1 | 2% Низкий | больше 3 лет назад | |
BDU:2021-04789 Уязвимость протокола сетевого времени NTP, связанная с недостаточной защитой служебных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 8.1 | 2% Низкий | почти 7 лет назад |
Уязвимостей на страницу