Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-bus d-bus 0.22 vulnerabilities and exploits
(subscribe to this query)
1.7
CVSSv2
CVE-2006-6107
Unspecified vulnerability in the match_rule_equal function in bus/signals.c in D-Bus prior to 1.0.2 allows local applications to remove match rules for other applications and cause a denial of service (lost process messages).
D-bus D-bus 1.0
D-bus D-bus 1.0.1
D-bus D-bus 0.20
D-bus D-bus 0.21
D-bus D-bus 0.22
D-bus D-bus 0.23
D-bus D-bus 0.13
2.1
CVSSv2
CVE-2005-0201
D-BUS (dbus) prior to 0.22 does not properly restrict access to a socket, if the socket address is known, which allows local users to listen or send arbitrary messages on another user's per-user session bus via that socket.
D-bus D-bus
2.1
CVSSv2
CVE-2008-3834
The dbus_signature_validate function in the D-bus library (libdbus) prior to 1.2.4 allows remote malicious users to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
Freedesktop Dbus 1.1.1
Freedesktop Dbus1.1.0
Freedesktop Dbus 0.62
Freedesktop Dbus 0.61
Freedesktop Dbus 0.35
Freedesktop Dbus 0.34
Freedesktop Dbus 0.33
Freedesktop Dbus 0.22
Freedesktop Dbus 0.21
Freedesktop Dbus 0.8
Freedesktop Dbus 0.7
Freedesktop Dbus 1.0.2
Freedesktop Dbus1.0 Rc1
Freedesktop Dbus 0.92
Freedesktop Dbus 0.36.1
Freedesktop Dbus 0.36
Freedesktop Dbus 0.23.3
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.12
Freedesktop Dbus 0.11
Freedesktop Dbus 0.4
Freedesktop Dbus 0.3
1 EDB exploit
3.6
CVSSv2
CVE-2009-1189
The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) prior to 1.2.14 uses incorrect logic to validate a basic type, which allows remote malicious users to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE...
Freedesktop Dbus 0.13
Freedesktop Dbus 0.60
Freedesktop Dbus 1.1.2
Freedesktop Dbus 0.34
Freedesktop Dbus 0.92
Freedesktop Dbus 0.50
Freedesktop Dbus
Freedesktop Dbus 0.35.1
Freedesktop Dbus 0.5
Freedesktop Dbus 0.36.1
Freedesktop Dbus 0.33
Freedesktop Dbus 1.0
Freedesktop Dbus 0.10
Freedesktop Dbus 0.11
Freedesktop Dbus 1.1.0
Freedesktop Dbus 0.2
Freedesktop Dbus 1.0.2
Freedesktop Dbus 1.1.20
Freedesktop Dbus 0.9
Freedesktop Dbus 1.2.1
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.35
4.6
CVSSv2
CVE-2008-4311
The default configuration of system.conf in D-Bus (aka DBus) prior to 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving message...
Freedesktop Dbus 1.1.4
Freedesktop Dbus 1.0
Freedesktop Dbus 0.92
Freedesktop Dbus 0.36.2
Freedesktop Dbus 0.36.1
Freedesktop Dbus
Freedesktop Dbus 1.1.2
Freedesktop Dbus 0.91
Freedesktop Dbus 0.90
Freedesktop Dbus 0.36
Freedesktop Dbus 0.35.2
Freedesktop Dbus 0.23.3
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.11
Freedesktop Dbus 0.10
Freedesktop Dbus 0.3
Freedesktop Dbus 0.2
Freedesktop Dbus 1.1.1
Freedesktop Dbus 1.1.0
Freedesktop Dbus 0.62
Freedesktop Dbus 0.61
Freedesktop Dbus 0.35.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started