A vulnerability, which was classified as problematic, has been found in ntpd 4.2.8. This issue affects some unknown processing of the component Private Mode. The manipulation leads to integer overflow.
The identification of this vulnerability is CVE-2015-7848. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as critical was found in ntp 4.2.8. Affected by this vulnerability is an unknown functionality of the component Crypto NAK Handler. The manipulation leads to improper input validation.
This vulnerability is known as CVE-2016-1547. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, has been found in ntp 4.2.8. Affected by this issue is some unknown functionality of the component ntpd Client. The manipulation leads to data processing error.
This vulnerability is handled as CVE-2016-1548. The attack may be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in ntp 4.2.8. This affects an unknown part of the component Ephemeral Association Handler. The manipulation leads to data processing error.
This vulnerability is uniquely identified as CVE-2016-1549. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in ntp 4.2.8 and classified as critical. This vulnerability affects unknown code of the component constant-time Memory Comparison. The manipulation leads to information disclosure.
This vulnerability was named CVE-2016-1550. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Oracle Exalogic Infrastructure 1.x/2.x. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Base Image. The manipulation leads to data processing error.
This vulnerability is known as CVE-2016-1548. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in Trane ComfortLink II SCC 2.0.2. This issue affects some unknown processing. The manipulation leads to hard-coded credentials.
The identification of this vulnerability is CVE-2015-2867. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in Trane ComfortLink II 2.0.2. Affected is an unknown function of the component DSS Service. The manipulation as part of REG Request leads to memory corruption.
This vulnerability is traded as CVE-2015-2868. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in Ruby. It has been classified as critical. This affects the function WIN32OLE. The manipulation leads to type confusion.
This vulnerability is uniquely identified as CVE-2016-2336. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Ruby. It has been declared as critical. This vulnerability affects the function TclTkIp. The manipulation of the argument retval leads to type confusion.
This vulnerability was named CVE-2016-2337. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Ruby. It has been rated as critical. This issue affects the function Fiddle::Function.new. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2016-2339. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Pidgin. Affected is an unknown function of the component MXIT Protocol Handler. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2016-2365. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Pidgin. Affected by this vulnerability is an unknown functionality of the component MXIT Protocol Handler. The manipulation leads to out-of-bounds read.
This vulnerability is known as CVE-2016-2366. The attack can be launched remotely. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Pidgin up to 2.10.x and classified as problematic. Affected by this issue is some unknown functionality of the component MXIT Markup Command Handler. The manipulation leads to denial of service.
This vulnerability is handled as CVE-2016-2365. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Pidgin up to 2.10.x. It has been classified as problematic. This affects an unknown part of the component MXIT Table Command Handler. The manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2016-2366. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Pidgin up to 2.10.x. It has been declared as problematic. This vulnerability affects unknown code of the component MXIT Avatar Length Handler. The manipulation leads to information disclosure (Memory).
This vulnerability was named CVE-2016-2367. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as problematic, has been found in Linux Kernel up to 6.8-rc1. This issue affects some unknown processing of the component Bluetooth. The manipulation leads to race condition.
The identification of this vulnerability is CVE-2024-24858. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Linux Kernel up to 6.8-rc2 and classified as problematic. Affected by this issue is the function min_key_size_set/max_key_size_set of the component Bluetooth Device Handler. The manipulation leads to race condition.
This vulnerability is handled as CVE-2024-24860. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.