Summary
Detail | |||
---|---|---|---|
Vendor | Ntp | First view | 2004-08-06 |
Product | Ntp | Last view | 2023-04-11 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.4 | 2023-04-11 | CVE-2023-26555 | praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver. |
5.6 | 2023-04-11 | CVE-2023-26554 | mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. |
5.6 | 2023-04-11 | CVE-2023-26553 | mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. |
5.6 | 2023-04-11 | CVE-2023-26552 | mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd. |
5.6 | 2023-04-11 | CVE-2023-26551 | mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp |
4.9 | 2020-06-24 | CVE-2020-15025 | ntpd in ntp 4.2.8 before 4.2.8p15 and 4.3.x before 4.3.101 allows remote attackers to cause a denial of service (memory consumption) by sending packets, because memory is not freed in situations where a CMAC key is used and associated with a CMAC algorithm in the ntp.keys file. |
7.4 | 2020-06-04 | CVE-2020-13817 | ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance. |
5.3 | 2020-05-06 | CVE-2018-8956 | ntpd in ntp 4.2.8p10, 4.2.8p11, 4.2.8p12 and 4.2.8p13 allow remote attackers to prevent a broadcast client from synchronizing its clock with a broadcast NTP server via soofed mode 3 and mode 5 packets. The attacker must either be a part of the same broadcast network or control a slave in that broadcast network that can capture certain required packets on the attacker's behalf and send them to the attacker. |
7.5 | 2020-04-17 | CVE-2020-11868 | ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows an off-path attacker to block unauthenticated synchronization via a server mode packet with a spoofed source IP address, because transmissions are rescheduled even when a packet lacks a valid origin timestamp. |
6.5 | 2020-01-28 | CVE-2015-7851 | Directory traversal vulnerability in the save_config function in ntpd in ntp_control.c in NTP before 4.2.8p4, when used on systems that do not use '\' or '/' characters for directory separation such as OpenVMS, allows remote authenticated users to overwrite arbitrary files. |
5.3 | 2020-01-08 | CVE-2014-5209 | An Information Disclosure vulnerability exists in NTP 4.2.7p25 private (mode 6/7) messages via a GET_RESTRICT control message, which could let a malicious user obtain sensitive information. |
7.5 | 2019-05-15 | CVE-2019-8936 | NTP through 4.2.8p12 has a NULL Pointer Dereference. |
8.1 | 2019-04-18 | CVE-2019-11331 | Network Time Protocol (NTP), as specified in RFC 5905, uses port 123 even for modes where a fixed port number is not required, which makes it easier for remote attackers to conduct off-path attacks. |
9.8 | 2018-06-20 | CVE-2018-12327 | Stack-based buffer overflow in ntpq and ntpdc of NTP version 4.2.8p11 allows an attacker to achieve code execution or escalate to higher privileges via a long string as the argument for an IPv4 or IPv6 command-line parameter. NOTE: It is unclear whether there are any common situations in which ntpq or ntpdc is used with a command line from an untrusted source. |
5.9 | 2018-06-04 | CVE-2016-9042 | An exploitable denial of service vulnerability exists in the origin timestamp check functionality of ntpd 4.2.8p9. A specially crafted unauthenticated network packet can be used to reset the expected origin timestamp for target peers. Legitimate replies from targeted peers will fail the origin timestamp check (TEST2) causing the reply to be dropped and creating a denial of service condition. |
9.8 | 2018-03-08 | CVE-2018-7183 | Buffer overflow in the decodearr function in ntpq in ntp 4.2.8p6 through 4.2.8p10 allows remote attackers to execute arbitrary code by leveraging an ntpq query and sending a response with a crafted array. |
7.5 | 2018-03-06 | CVE-2018-7185 | The protocol engine in ntp 4.2.6 before 4.2.8p11 allows a remote attackers to cause a denial of service (disruption) by continually sending a packet with a zero-origin timestamp and source IP address of the "other side" of an interleaved association causing the victim ntpd to reset its association. |
7.5 | 2018-03-06 | CVE-2018-7184 | ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704. |
7.5 | 2018-03-06 | CVE-2018-7182 | The ctl_getitem method in ntpd in ntp-4.2.8p6 before 4.2.8p11 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted mode 6 packet with a ntpd instance from 4.2.8p6 through 4.2.8p10. |
5.3 | 2018-03-06 | CVE-2018-7170 | ntpd in ntp 4.2.x before 4.2.8p7 and 4.3.x before 4.3.92 allows authenticated users that know the private symmetric key to create arbitrarily-many ephemeral associations in order to win the clock selection of ntpd and modify a victim's clock via a Sybil attack. This issue exists because of an incomplete fix for CVE-2016-1549. |
5.3 | 2017-08-24 | CVE-2015-5146 | ntpd in ntp before 4.2.8p3 with remote configuration enabled allows remote authenticated users with knowledge of the configuration password and access to a computer entrusted to perform remote configuration to cause a denial of service (service crash) via a NULL byte in a crafted configuration directive packet. |
7.5 | 2017-08-09 | CVE-2015-3405 | ntp-keygen in ntp 4.2.8px before 4.2.8p2-RC2 and 4.3.x before 4.3.12 does not generate MD5 keys with sufficient entropy on big endian machines when the lowest order byte of the temp variable is between 0x20 and 0x7f and not #, which might allow remote attackers to obtain the value of generated MD5 keys via a brute force attack with the 93 possible keys. |
9.8 | 2017-08-07 | CVE-2015-7871 | Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication. |
6.5 | 2017-08-07 | CVE-2015-7855 | The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value. |
8.8 | 2017-08-07 | CVE-2015-7854 | Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
27% (24) | CWE-20 | Improper Input Validation |
11% (10) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
9% (8) | CWE-787 | Out-of-bounds Write |
5% (5) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
4% (4) | CWE-476 | NULL Pointer Dereference |
4% (4) | CWE-287 | Improper Authentication |
3% (3) | CWE-254 | Security Features |
3% (3) | CWE-19 | Data Handling |
3% (3) | CWE-17 | Code |
2% (2) | CWE-362 | Race Condition |
2% (2) | CWE-284 | Access Control (Authorization) Issues |
2% (2) | CWE-200 | Information Exposure |
2% (2) | CWE-125 | Out-of-bounds Read |
2% (2) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
1% (1) | CWE-772 | Missing Release of Resource after Effective Lifetime |
1% (1) | CWE-704 | Incorrect Type Conversion or Cast |
1% (1) | CWE-682 | Incorrect Calculation |
1% (1) | CWE-416 | Use After Free |
1% (1) | CWE-401 | Failure to Release Memory Before Removing Last Reference ('Memory L... |
1% (1) | CWE-399 | Resource Management Errors |
1% (1) | CWE-361 | Time and State |
1% (1) | CWE-346 | Origin Validation Error |
1% (1) | CWE-331 | Insufficient Entropy |
1% (1) | CWE-330 | Use of Insufficiently Random Values |
1% (1) | CWE-190 | Integer Overflow or Wraparound |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:7079 | DSA-1702 ntp -- interpretation conflict |
oval:org.mitre.oval:def:13964 | USN-705-1 -- ntp vulnerability |
oval:org.mitre.oval:def:13252 | DSA-1702-1 ntp -- interpretation conflict |
oval:org.mitre.oval:def:10035 | NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check t... |
oval:org.mitre.oval:def:22471 | ELSA-2009:0046: ntp security update (Moderate) |
oval:org.mitre.oval:def:28923 | RHSA-2009:0046 -- ntp security update (Moderate) |
oval:org.mitre.oval:def:9634 | Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntp... |
oval:org.mitre.oval:def:8665 | VMware ntpd stack-based buffer overflow vulnerability |
oval:org.mitre.oval:def:8386 | VMware ntpq stack-based buffer overflow vulnerability |
oval:org.mitre.oval:def:5411 | HP-UX Running XNTP, Remote Execution of Arbitrary Code |
oval:org.mitre.oval:def:19392 | HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary... |
oval:org.mitre.oval:def:8042 | DSA-1801 ntp -- buffer overflows |
oval:org.mitre.oval:def:6307 | HP-UX Running XNTP, Remote Execution of Arbitrary Code |
oval:org.mitre.oval:def:13464 | DSA-1801-1 ntp -- buffer overflows |
oval:org.mitre.oval:def:13106 | USN-777-1 -- ntp vulnerabilities |
oval:org.mitre.oval:def:11231 | Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in nt... |
oval:org.mitre.oval:def:22874 | ELSA-2009:1039: ntp security update (Important) |
oval:org.mitre.oval:def:29463 | RHSA-2009:1039 -- ntp security update (Important) |
oval:org.mitre.oval:def:7379 | DSA-1948 ntp -- denial of service |
oval:org.mitre.oval:def:7310 | DSA-1992 chrony -- several vulnerabilities |
oval:org.mitre.oval:def:7076 | NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability |
oval:org.mitre.oval:def:19376 | HP-UX Running XNTP, Remote Denial of Service (DoS) and Execution of Arbitrary... |
oval:org.mitre.oval:def:17673 | DSA-1948-1 ntp - denial of service |
oval:org.mitre.oval:def:13488 | USN-867-1 -- ntp vulnerability |
oval:org.mitre.oval:def:12783 | DSA-1992-1 chrony -- several |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
60847 | NTP ntpd Mode 7 Request Crafted Packet Reply Loop Remote DoS |
54576 | NTP ntpd/ntp_crypto.c crypto_recv() Function Remote Overflow |
53593 | NTP ntpq/ntpq.c cookedprint() Function Remote Overflow |
51164 | OpenSSL EVP_VerifyFinal Function DSA / ECDSA Key Validation Weakness |
15975 | NTP ntpd Date/Time Request Remote Overflow |
ExploitDB Exploits
id | Description |
---|---|
33073 | NTP ntpd monlist Query Reflection - Denial of Service |
OpenVAS Exploits
id | Description |
---|---|
2012-04-16 | Name : VMSA-2010-0009: ESXi utilities and ESX Service Console third party updates File : nvt/gb_VMSA-2010-0009.nasl |
2011-08-09 | Name : CentOS Update for ntp CESA-2009:0046 centos5 i386 File : nvt/gb_CESA-2009_0046_ntp_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for ntp CESA-2009:1039 centos5 i386 File : nvt/gb_CESA-2009_1039_ntp_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for ntp CESA-2009:1651 centos3 i386 File : nvt/gb_CESA-2009_1651_ntp_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for ntp CESA-2009:1648 centos5 i386 File : nvt/gb_CESA-2009_1648_ntp_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for ntp CESA-2009:1648 centos4 i386 File : nvt/gb_CESA-2009_1648_ntp_centos4_i386.nasl |
2011-06-06 | Name : HP-UX Update for XNTP HPSBUX02639 File : nvt/gb_hp_ux_HPSBUX02639.nasl |
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2010-02-10 | Name : Debian Security Advisory DSA 1992-1 (chrony) File : nvt/deb_1992_1.nasl |
2010-01-11 | Name : FreeBSD Security Advisory (FreeBSD-SA-10:02.ntpd.asc) File : nvt/freebsdsa_ntpd2.nasl |
2010-01-07 | Name : Gentoo Security Advisory GLSA 201001-01 (ntp) File : nvt/glsa_201001_01.nasl |
2009-12-15 | Name : NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability File : nvt/ntp_37255.nasl |
2009-12-14 | Name : CentOS Security Advisory CESA-2009:1651 (ntp) File : nvt/ovcesa2009_1651.nasl |
2009-12-14 | Name : CentOS Security Advisory CESA-2009:1648 (ntp) File : nvt/ovcesa2009_1648.nasl |
2009-12-14 | Name : Fedora Core 12 FEDORA-2009-13046 (ntp) File : nvt/fcore_2009_13046.nasl |
2009-12-14 | Name : Fedora Core 11 FEDORA-2009-13090 (ntp) File : nvt/fcore_2009_13090.nasl |
2009-12-14 | Name : Fedora Core 10 FEDORA-2009-13121 (ntp) File : nvt/fcore_2009_13121.nasl |
2009-12-14 | Name : Debian Security Advisory DSA 1948-1 (ntp) File : nvt/deb_1948_1.nasl |
2009-12-14 | Name : RedHat Security Advisory RHSA-2009:1651 File : nvt/RHSA_2009_1651.nasl |
2009-12-14 | Name : RedHat Security Advisory RHSA-2009:1648 File : nvt/RHSA_2009_1648.nasl |
2009-12-10 | Name : Mandriva Security Advisory MDVSA-2009:309 (ntp) File : nvt/mdksa_2009_309.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-13 | Name : Solaris Update for usr/sbin/ntpq 141396-01 File : nvt/gb_solaris_141396_01.nasl |
2009-10-13 | Name : SLES10: Security update for xntp File : nvt/sles10_xntp.nasl |
2009-10-13 | Name : SLES10: Security update for xntp File : nvt/sles10_xntp0.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0150 | Multiple Security Vulnerabilities in Juniper Networks CTPView Severity: Category I - VMSKEY: V0061073 |
2015-A-0113 | Multiple Vulnerabilities in Juniper Networks CTPOS Severity: Category I - VMSKEY: V0060737 |
2015-A-0041 | Multiple Vulnerabilities in Network Time Protocol (NTP) Severity: Category I - VMSKEY: V0058907 |
Snort® IPS/IDS
Date | Description |
---|---|
2018-09-19 | ntpq decode array buffer overflow attempt RuleID : 47585 - Type : SERVER-OTHER - Revision : 4 |
2018-05-22 | Multiple Vendors NTP zero-origin timestamp denial of service attempt RuleID : 46387 - Type : SERVER-OTHER - Revision : 3 |
2018-03-23 | NTP crypto-NAK denial of service attempt RuleID : 45693 - Type : SERVER-OTHER - Revision : 3 |
2018-05-23 | SSDP M-SEARCH ssdp-all potential amplified distributed denial-of-service attempt RuleID : 45157-community - Type : SERVER-OTHER - Revision : 4 |
2018-01-11 | SSDP M-SEARCH ssdp-all potential amplified distributed denial-of-service attempt RuleID : 45157 - Type : SERVER-OTHER - Revision : 4 |
2017-12-13 | NTP crypto-NAK denial of service attempt RuleID : 44756 - Type : SERVER-OTHER - Revision : 3 |
2017-06-16 | ntpq flagstr buffer overflow attempt RuleID : 42887 - Type : SERVER-OTHER - Revision : 3 |
2017-05-16 | NTP malformed config request denial of service attempt RuleID : 42235 - Type : SERVER-OTHER - Revision : 3 |
2017-05-16 | NTP Config Unpeer denial of service attempt RuleID : 42227 - Type : SERVER-OTHER - Revision : 3 |
2017-01-25 | NTPD zero origin timestamp denial of service attempt RuleID : 41367 - Type : SERVER-OTHER - Revision : 6 |
2017-01-04 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40897 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40864 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40863 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40862 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40861 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40860 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40859 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40858 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40857 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40856 - Type : SERVER-OTHER - Revision : 3 |
2016-12-29 | ntpd mrulist control message command null pointer dereference attempt RuleID : 40855 - Type : SERVER-OTHER - Revision : 3 |
2016-12-20 | NTP origin timestamp denial of service attempt RuleID : 40811 - Type : SERVER-OTHER - Revision : 4 |
2016-03-14 | NTP crypto-NAK possible DoS attempt RuleID : 37843 - Type : SERVER-OTHER - Revision : 4 |
2016-03-14 | ntpd reference clock impersonation attempt RuleID : 37842 - Type : SERVER-OTHER - Revision : 4 |
2016-03-14 | ntpd reference clock impersonation attempt RuleID : 37841 - Type : SERVER-OTHER - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-08 | Name: The remote EulerOS host is missing a security update. File: EulerOS_SA-2019-1014.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-e585e25b72.nasl - Type: ACT_GATHER_INFO |
2018-12-20 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-3854.nasl - Type: ACT_GATHER_INFO |
2018-11-27 | Name: The remote Virtuozzo host is missing a security update. File: Virtuozzo_VZLSA-2017-3071.nasl - Type: ACT_GATHER_INFO |
2018-09-20 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1083.nasl - Type: ACT_GATHER_INFO |
2018-08-31 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0180.nasl - Type: ACT_GATHER_INFO |
2018-08-31 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0088.nasl - Type: ACT_GATHER_INFO |
2018-08-20 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-229-01.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0003.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2017-0010.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0167.nasl - Type: ACT_GATHER_INFO |
2018-08-17 | Name: The remote NTP server is affected by multiple vulnerabilities. File: ntp_4_2_8p12.nasl - Type: ACT_GATHER_INFO |
2018-05-29 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201805-12.nasl - Type: ACT_GATHER_INFO |
2018-05-11 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1009.nasl - Type: ACT_GATHER_INFO |
2018-05-11 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1009.nasl - Type: ACT_GATHER_INFO |
2018-04-27 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-0855.nasl - Type: ACT_GATHER_INFO |
2018-04-10 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20150408-ntpd-ios.nasl - Type: ACT_GATHER_INFO |
2018-04-10 | Name: The remote device is missing a vendor-supplied security patch. File: cisco-sa-20150408-ntpd-iosxe.nasl - Type: ACT_GATHER_INFO |
2018-03-09 | Name: The remote NTP server is affected by multiple vulnerabilities. File: ntp_4_2_8p11.nasl - Type: ACT_GATHER_INFO |
2018-03-02 | Name: The remote Slackware host is missing a security update. File: Slackware_SSA_2018-060-02.nasl - Type: ACT_GATHER_INFO |
2018-02-28 | Name: The version of Arista Networks EOS running on the remote device is affected b... File: arista_eos_sa0019.nasl - Type: ACT_GATHER_INFO |
2018-02-28 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_af485ef41c5811e88477d05099c0ae8c.nasl - Type: ACT_GATHER_INFO |
2018-01-03 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL17114.nasl - Type: ACT_GATHER_INFO |
2017-12-28 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL99254031.nasl - Type: ACT_GATHER_INFO |
2017-12-21 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL02951273.nasl - Type: ACT_GATHER_INFO |