Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
bluez bluez - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1294
The affix_sock_register in the Affix Bluetooth Protocol Stack for Linux might allow local users to gain privileges via a socket call with a negative protocol value, which is used as an array index.
Nokia Affix
1 EDB exploit
6.3
CVSSv3
CVE-2023-45866
Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection, and accept HID keyboard reports, potentially permitting injection of HID messages when no user interaction has occurred in the Central role to ...
Google Android 4.2.2
Google Android 6.0.1
Google Android 10.0
Google Android 11.0
Google Android 13.0
Google Android 14.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 20.04
Canonical Ubuntu Linux 22.04
Canonical Ubuntu Linux 23.10
Apple Iphone Os 16.6
Apple Macos 12.6.7
Apple Macos 13.3.3
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Apple Macos
Apple Iphone Os
Apple Ipad Os
Debian Debian Linux 10.0
4 Github repositories
1 Article
4.2
CVSSv3
CVE-2020-26558
Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 up to and including 5.2 may permit a nearby man-in-the-middle malicious user to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the au...
Bluetooth Bluetooth Core Specification
Fedoraproject Fedora 34
Debian Debian Linux 9.0
Linux Linux Kernel
Intel Ax210 Firmware -
Intel Ax201 Firmware -
Intel Ax200 Firmware -
Intel Ac 9560 Firmware -
Intel Ac 9462 Firmware -
Intel Ac 9461 Firmware -
Intel Ac 9260 Firmware -
Intel Ac 8265 Firmware -
Intel Ac 8260 Firmware -
Intel Ac 3168 Firmware -
Intel Ac 7265 Firmware -
Intel Ac 3165 Firmware -
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
Intel Ac 1550 Firmware -
6.5
CVSSv3
CVE-2018-16264
The BlueZ system service in Tizen allows an unprivileged process to partially control Bluetooth or acquire sensitive information, due to improper D-Bus security policy configurations. This affects Tizen prior to 5.0 M1, and Tizen-based firmwares including Samsung Galaxy Gear seri...
Linux Tizen 1.0
Linux Tizen 2.0
Linux Tizen 2.1
Linux Tizen 2.2
Linux Tizen 2.2.1
Linux Tizen 2.3
Linux Tizen 2.3.1
Linux Tizen 2.4
Linux Tizen 3.0
Linux Tizen 4.0
Linux Tizen 5.0
6.1
CVSSv3
CVE-2020-15710
Potential double free in Bluez 5 module of PulseAudio could allow a local malicious user to leak memory or crash the program. The modargs variable may be freed twice in the fail condition in src/modules/bluetooth/module-bluez5-device.c and src/modules/bluetooth/module-bluez5-devi...
Pulseaudio Project Pulseaudio 1\\
8.8
CVSSv3
CVE-2017-8403
360fly 4K cameras allow unauthenticated Wi-Fi password changes and complete access with REST by using the Bluetooth Low Energy pairing procedure, which is available at any time and does not require a password. This affects firmware 2.1.4. Exploitation can use the 360fly Android o...
360fly 4k Camera Firmware 2.1.4
NA
CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 up to and including 2.4.30-rc1 and 2.6 up to and including 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value.
Conectiva Linux 10.0
Linux Linux Kernel 2.4.15
Linux Linux Kernel 2.4.16
Linux Linux Kernel 2.4.23
Linux Linux Kernel 2.4.24
Linux Linux Kernel 2.4.7
Linux Linux Kernel 2.4.8
Linux Linux Kernel 2.4.9
Linux Linux Kernel 2.6.4
Linux Linux Kernel 2.6.5
Redhat Enterprise Linux 4.0
Redhat Enterprise Linux Desktop 4.0
Suse Suse Linux 1.0
Suse Suse Linux 9.3
Linux Linux Kernel 2.4.10
Linux Linux Kernel 2.4.17
Linux Linux Kernel 2.4.18
Linux Linux Kernel 2.4.25
Linux Linux Kernel 2.4.26
Linux Linux Kernel 2.6.0
Linux Linux Kernel 2.6.1
Linux Linux Kernel 2.6.6
4 EDB exploits
7
CVSSv3
CVE-2020-15238
Blueman is a GTK+ Bluetooth Manager. In Blueman prior to 2.1.4, the DhcpClient method of the D-Bus interface to blueman-mechanism is prone to an argument injection vulnerability. The impact highly depends on the system configuration. If Polkit-1 is disabled and for versions lower...
Blueman Project Blueman
Debian Debian Linux 9.0
Debian Debian Linux 10.0
Fedoraproject Fedora 31
Fedoraproject Fedora 32
Fedoraproject Fedora 33
8.8
CVSSv3
CVE-2017-0781
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146105.
Google Android 7.1.0
Google Android 7.1.1
Google Android 5.1.0
Google Android 5.1.1
Google Android 4.1.2
Google Android 4.2
Google Android 4.4.2
Google Android 4.4.3
Google Android 4.4.4
Google Android 8.0
Google Android 7.0
Google Android 5.0.2
Google Android 5.1
Google Android 4.0.4
Google Android 4.1
Google Android 4.4
Google Android 4.4.1
Google Android 5.0
Google Android 5.0.1
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.3
1 EDB exploit
20 Github repositories
8.8
CVSSv3
CVE-2017-0782
A remote code execution vulnerability in the Android system (bluetooth). Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-63146237.
Google Android 8.0
Google Android 7.0
Google Android 5.0.1
Google Android 5.0.2
Google Android 4.0.4
Google Android 4.1
Google Android 4.4
Google Android 4.4.1
Google Android 6.0.1
Google Android 5.0
Google Android 4.0.2
Google Android 4.0.3
Google Android 4.3
Google Android 4.3.1
Google Android 7.1.2
Google Android 6.0
Google Android 5.1.1
Google Android 4.0
Google Android 4.0.1
Google Android 4.2.1
Google Android 4.2.2
Google Android 4.4.4
4 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
NEXT »