Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bluetooth bluetooth core vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-24023
Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 up to and including 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injecti...
Bluetooth Bluetooth Core Specification
Microsoft Windows 10 22h2
Microsoft Windows 11 21h2
Microsoft Windows 11 22h2
Microsoft Windows 11 23h2
Microsoft Windows Server 2022 23h2
Microsoft Windows 10 21h2
Microsoft Windows 10 1809
Microsoft Windows Server 2019
Microsoft Windows Server 2022
1 Github repository
1 Article
384
VMScore
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 up to and including 5.2 may permit a nearby man-in-the-middle malicious user to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the au...
Bluetooth Bluetooth Core Specification
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Linux Linux Kernel
Intel Ax210 Firmware -
Intel Ax201 Firmware -
Intel Ax200 Firmware -
Intel Ac 9560 Firmware -
Intel Ac 9462 Firmware -
Intel Ac 9461 Firmware -
Intel Ac 9260 Firmware -
Intel Ac 8265 Firmware -
Intel Ac 8260 Firmware -
Intel Ac 3168 Firmware -
Intel Ac 7265 Firmware -
Intel Ac 3165 Firmware -
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
Intel Ac 1550 Firmware -
740
VMScore
CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 up to and including 2.4.30-rc1 and 2.6 up to and including 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 1.0
Suse Suse Linux 9.3
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
4 EDB exploits
190
VMScore
CVE-2022-0001
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Intel Celeron J4005 -
Intel Celeron N4100 -
Intel Celeron N4000 -
Intel Celeron J4105 -
Intel Pentium Silver J5005 -
Intel Pentium Silver N5000 -
Intel Core I3-10110u -
Intel Core I3-1005g1 -
Intel Core I5-10210u -
Intel Core I5-10310y -
Intel Core I5-10210y -
Intel Core I5-1035g4 -
Intel Core I5-1035g7 -
Intel Core I5-1035g1 -
Intel Core I5-9300h -
Intel Core I5-9400h -
Intel Core I5-9400 -
Intel Core I5-9600k -
Intel Core I5-8265u -
Intel Core I5-8200y -
Intel Core I7-10510u -
Intel Core I7-10510y -
9 Github repositories
3 Articles
187
VMScore
CVE-2022-0002
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Intel Celeron J4005 -
Intel Celeron N4100 -
Intel Celeron N4000 -
Intel Celeron J4105 -
Intel Celeron J3355 -
Intel Celeron N3350 -
Intel Celeron J3455 -
Intel Celeron N3450 -
Intel Atom X5-e3930 -
Intel Atom X5-e3940 -
Intel Atom X7-e3950 -
Intel Pentium Silver J5005 -
Intel Pentium Silver N5000 -
Intel Core I3-10110u -
Intel Core I3-1005g1 -
Intel Core I5-10210u -
Intel Core I5-10310y -
Intel Core I5-10210y -
Intel Core I5-1035g4 -
Intel Core I5-1035g7 -
Intel Core I5-1035g1 -
Intel Core I5-9300h -
1 Github repository
3 Articles
187
VMScore
CVE-2022-0322
A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of s...
Linux Linux Kernel 5.15
Linux Linux Kernel
Fedoraproject Fedora 35
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
418
VMScore
CVE-2020-27820
A vulnerability was found in Linux kernel, where a use-after-frees in nouveau's postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if "unbind" the driver).
Linux Linux Kernel 2.6.12
Linux Linux Kernel
Fedoraproject Fedora 33
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
187
VMScore
CVE-2021-43389
An issue exists in the Linux kernel prior to 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Oracle Communications Cloud Native Core Binding Support Function 22.1.3
Oracle Communications Cloud Native Core Policy 22.2.0
Oracle Communications Cloud Native Core Network Exposure Function 22.1.1
488
VMScore
CVE-2017-5753
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
42 Github repositories
9 Articles
210
VMScore
CVE-2017-5715
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Intel Atom C C2308
Intel Atom C C2316
Intel Atom C C2338
Intel Atom C C2350
Intel Atom C C2358
Intel Atom C C2508
Intel Atom C C2516
Intel Atom C C2518
Intel Atom C C2530
Intel Atom C C2538
Intel Atom C C2550
Intel Atom C C2558
Intel Atom C C2718
Intel Atom C C2730
Intel Atom C C2738
Intel Atom C C2750
Intel Atom C C2758
Intel Atom C C3308
Intel Atom C C3338
Intel Atom C C3508
Intel Atom C C3538
Intel Atom C C3558
1 EDB exploit
49 Github repositories
9 Articles
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »