Lucene search

K

Bluetooth Stack Security Vulnerabilities

cve
cve

CVE-2017-9212

The Bluetooth stack on the BMW 330i 2011 allows a remote crash of the CD/Multimedia software via %x or %c format string specifiers in a device...

7.5CVSS

7.5AI Score

0.001EPSS

2017-05-23 02:29 PM
28
cve
cve

CVE-2015-0884

Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space...

6.7AI Score

0.0004EPSS

2015-02-28 02:59 AM
18
cve
cve

CVE-2011-1265

The Bluetooth Stack 2.1 in Microsoft Windows Vista SP1 and SP2 and Windows 7 Gold and SP1 does not prevent access to objects in memory that (1) were not properly initialized or (2) have been deleted, which allows remote attackers to execute arbitrary code via crafted Bluetooth packets, aka...

8.8CVSS

9AI Score

0.679EPSS

2011-07-13 10:55 PM
23
cve
cve

CVE-2006-6904

Unspecified vulnerability in the Broadcom Bluetooth stack allows remote attackers to gain administrative access (aka Remote Root) via unspecified...

7.8AI Score

0.007EPSS

2006-12-31 05:00 AM
17
cve
cve

CVE-2006-5611

Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to...

6.7AI Score

0.003EPSS

2006-10-31 12:07 AM
19
cve
cve

CVE-2006-3146

The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was...

7.5AI Score

0.159EPSS

2006-06-22 10:06 PM
26
cve
cve

CVE-2006-0212

Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\ sequences in the RFILE argument of...

7.7AI Score

0.015EPSS

2006-01-14 01:03 AM
17