Total vulnerabilities in the database
The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
Software | From | Fixed in |
---|---|---|
ntp / ntp | 4.2.8-p2 | 4.2.8-p2.x |
ntp / ntp | 4.2.8-p3 | 4.2.8-p3.x |
ntp / ntp | 4.2.8-p1 | 4.2.8-p1.x |
ntp / ntp | 4.2.8-p3-rc3 | 4.2.8-p3-rc3.x |
ntp / ntp | 4.2.8-p3-rc2 | 4.2.8-p3-rc2.x |
ntp / ntp | 4.2.8-p3-rc1 | 4.2.8-p3-rc1.x |
ntp / ntp | 4.2.8-p2-rc3 | 4.2.8-p2-rc3.x |
ntp / ntp | 4.2.8-p2-rc2 | 4.2.8-p2-rc2.x |
ntp / ntp | 4.2.8-p2-rc1 | 4.2.8-p2-rc1.x |
ntp / ntp | 4.2.8-p1-rc2 | 4.2.8-p1-rc2.x |
ntp / ntp | 4.2.8-p1-rc1 | 4.2.8-p1-rc1.x |
ntp / ntp | 4.2.8-p1-beta5 | 4.2.8-p1-beta5.x |
ntp / ntp | 4.2.8-p1-beta4 | 4.2.8-p1-beta4.x |
ntp / ntp | 4.2.8-p1-beta3 | 4.2.8-p1-beta3.x |
ntp / ntp | 4.2.8-p1-beta2 | 4.2.8-p1-beta2.x |
ntp / ntp | 4.2.8-p1-beta1 | 4.2.8-p1-beta1.x |
ntp / ntp | 4.3.0 | 4.3.77 |
ntp / ntp | 4.2.8 | 4.2.8.x |
ntp / ntp | 4.2.0 | 4.2.8 |
citrix / xenserver | 7.0 | 7.0.x |
citrix / xenserver | 6.0.2 | 6.0.2.x |
citrix / xenserver | 6.5 | 6.5.x |
citrix / xenserver | 6.2.0 | 6.2.0.x |
siemens / tim_4r-ie_firmware | - | - |
siemens / tim_4r-ie_dnp3_firmware | - | - |