Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-bus d-bus 0.22 vulnerabilities and exploits
(subscribe to this query)
151
VMScore
CVE-2006-6107
Unspecified vulnerability in the match_rule_equal function in bus/signals.c in D-Bus prior to 1.0.2 allows local applications to remove match rules for other applications and cause a denial of service (lost process messages).
D-bus D-bus 1.0
D-bus D-bus 1.0.1
D-bus D-bus 0.20
D-bus D-bus 0.21
D-bus D-bus 0.22
D-bus D-bus 0.23
D-bus D-bus 0.13
187
VMScore
CVE-2005-0201
D-BUS (dbus) prior to 0.22 does not properly restrict access to a socket, if the socket address is known, which allows local users to listen or send arbitrary messages on another user's per-user session bus via that socket.
D-bus D-bus
215
VMScore
CVE-2008-3834
The dbus_signature_validate function in the D-bus library (libdbus) prior to 1.2.4 allows remote malicious users to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
Freedesktop Dbus 1.1.1
Freedesktop Dbus1.1.0
Freedesktop Dbus 0.62
Freedesktop Dbus 0.61
Freedesktop Dbus 0.35
Freedesktop Dbus 0.34
Freedesktop Dbus 0.33
Freedesktop Dbus 0.22
Freedesktop Dbus 0.21
Freedesktop Dbus 0.8
Freedesktop Dbus 0.7
Freedesktop Dbus 1.0.2
Freedesktop Dbus1.0 Rc1
Freedesktop Dbus 0.92
Freedesktop Dbus 0.36.1
Freedesktop Dbus 0.36
Freedesktop Dbus 0.23.3
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.12
Freedesktop Dbus 0.11
Freedesktop Dbus 0.4
Freedesktop Dbus 0.3
1 EDB exploit
320
VMScore
CVE-2009-1189
The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) prior to 1.2.14 uses incorrect logic to validate a basic type, which allows remote malicious users to spoof a signature via a crafted key. NOTE: this is due to an incorrect fix for CVE...
Freedesktop Dbus 0.13
Freedesktop Dbus 0.60
Freedesktop Dbus 1.1.2
Freedesktop Dbus 0.34
Freedesktop Dbus 0.92
Freedesktop Dbus 0.50
Freedesktop Dbus
Freedesktop Dbus 0.35.1
Freedesktop Dbus 0.5
Freedesktop Dbus 0.36.1
Freedesktop Dbus 0.33
Freedesktop Dbus 1.0
Freedesktop Dbus 0.10
Freedesktop Dbus 0.11
Freedesktop Dbus 1.1.0
Freedesktop Dbus 0.2
Freedesktop Dbus 1.0.2
Freedesktop Dbus 1.1.20
Freedesktop Dbus 0.9
Freedesktop Dbus 1.2.1
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.35
409
VMScore
CVE-2008-4311
The default configuration of system.conf in D-Bus (aka DBus) prior to 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving message...
Freedesktop Dbus 1.1.4
Freedesktop Dbus 1.0
Freedesktop Dbus 0.92
Freedesktop Dbus 0.36.2
Freedesktop Dbus 0.36.1
Freedesktop Dbus
Freedesktop Dbus 1.1.2
Freedesktop Dbus 0.91
Freedesktop Dbus 0.90
Freedesktop Dbus 0.36
Freedesktop Dbus 0.35.2
Freedesktop Dbus 0.23.3
Freedesktop Dbus 0.23.2
Freedesktop Dbus 0.11
Freedesktop Dbus 0.10
Freedesktop Dbus 0.3
Freedesktop Dbus 0.2
Freedesktop Dbus 1.1.1
Freedesktop Dbus 1.1.0
Freedesktop Dbus 0.62
Freedesktop Dbus 0.61
Freedesktop Dbus 0.35.1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started