Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ntp ntp 4.2.5 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2015-7871
Crypto-NAK packets in ntpd in NTP 4.2.x prior to 4.2.8p4, and 4.3.x prior to 4.3.77 allows remote malicious users to bypass authentication.
Ntp Ntp 4.2.5
Ntp Ntp 4.2.8
Ntp Ntp
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
Netapp Oncommand Balance -
Netapp Clustered Data Ontap -
Netapp Data Ontap -
Netapp Oncommand Unified Manager -
Netapp Oncommand Performance Manager -
NA
CVE-2009-3563
ntp_request.c in ntpd in NTP prior to 4.2.4p8, and 4.2.5, allows remote malicious users to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE erro...
Ntp Ntp
Ntp Ntp 4.2.2
Ntp Ntp 4.2.0
Ntp Ntp 4.0.98
Ntp Ntp 4.0.72
Ntp Ntp 4.0.90
Ntp Ntp 4.0.96
Ntp Ntp 4.0.93
Ntp Ntp 4.1.0
Ntp Ntp 4.1.2
Ntp Ntp 4.2.5
Ntp Ntp 4.0.99
Ntp Ntp 4.0.95
Ntp Ntp 4.2.2p3
Ntp Ntp 4.2.2p2
Ntp Ntp 4.0.92
Ntp Ntp 4.0.73
Ntp Ntp 4.0.97
Ntp Ntp 4.0.91
Ntp Ntp 4.2.2p1
Ntp Ntp 4.0.94
NA
CVE-2009-1252
Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP prior to 4.2.4p7 and 4.2.5 prior to 4.2.5p74, when OpenSSL and autokey are enabled, allows remote malicious users to execute arbitrary code via a crafted packet containing an extension field.
Ntp Ntp 4.2.5p65
Ntp Ntp 4.2.5p1
Ntp Ntp 4.2.5p64
Ntp Ntp 4.2.5p32
Ntp Ntp 4.2.5p15
Ntp Ntp 4.2.5p0
Ntp Ntp 4.2.5p71
Ntp Ntp 4.2.5p40
Ntp Ntp 4.2.5p59
Ntp Ntp 4.2.5p30
Ntp Ntp 4.2.5p18
Ntp Ntp 4.2.4p5
Ntp Ntp 4.2.5p61
Ntp Ntp 4.2.5p47
Ntp Ntp 4.2.5p14
Ntp Ntp 4.2.4p4
Ntp Ntp 4.2.5p29
Ntp Ntp 4.2.5p13
Ntp Ntp 4.2.5p67
Ntp Ntp 4.2.5p7
Ntp Ntp 4.2.4p2
Ntp Ntp 4.2.5p63
NA
CVE-2009-0021
NTP 4.2.4 prior to 4.2.4p5 and 4.2.5 prior to 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote malicious users to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, ...
Ntp Ntp 4.2.2
Ntp Ntp 4.2.0
Ntp Ntp 4.2.4p2
Ntp Ntp 4.2.4p1
Ntp Ntp 4.2.4p3
Ntp Ntp
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started