📦 Bluez
by Bluez
🔍 What is Bluez?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in BlueZ (Linux Bluetooth stack) allows a use-after-free condition when a client disconnects during D-Bus processing of a WriteValue call. Attackers could potentially execute arbitr...
This vulnerability in BlueZ's HID over GATT Profile allows network-adjacent attackers to execute arbitrary code without authentication by exploiting improper access control. It affects Linux systems u...
This CVE describes a heap-based buffer overflow vulnerability in BlueZ's Phone Book Access Profile that allows network-adjacent attackers to execute arbitrary code as root. The vulnerability requires ...
This vulnerability allows attackers within Bluetooth range to execute arbitrary code with root privileges on systems running vulnerable BlueZ installations. The flaw exists in the AVRCP protocol handl...
This vulnerability in BlueZ's AVRCP Bluetooth audio profile allows network-adjacent attackers to execute arbitrary code with root privileges by sending specially crafted Bluetooth packets. It affects ...
CVE-2022-0204 is a heap overflow vulnerability in BlueZ Bluetooth stack versions before 5.63. An attacker on the local network can send specially crafted files to cause denial of service through appli...
This heap-based buffer overflow vulnerability in BlueZ's bluetoothd service allows attackers to execute arbitrary code or cause denial of service by sending specially crafted Bluetooth SDP requests. I...
This vulnerability in BlueZ's AVRCP protocol allows network-adjacent attackers to read sensitive information from memory via Bluetooth when a user connects to a malicious device. The flaw exists due t...
This vulnerability in BlueZ's AVRCP protocol allows attackers to read memory beyond allocated buffers via Bluetooth, potentially disclosing sensitive information. It affects Linux systems using BlueZ ...