Filters

Microsoft Windows 10Last updated 25 October 2024

First published (updated )

Bluetooth Bluetooth Core SpecificationBluetooth Classic in Bluetooth Core Specification through 5.3 does not properly conceal device infor…

First published (updated )

Bluetooth Bluetooth Core SpecificationBluetooth® Low Energy Pairing in Bluetooth Core Specification v4.0 through v5.3 may permit an unauth…

7.5
First published (updated )

Bluetooth Bluetooth Core SpecificationBluetooth® Pairing in Bluetooth Core Specification v1.0B through v5.3 may permit an unauthenticated …

7.5
First published (updated )

Bluetooth Bluetooth Core SpecificationAn information leakage vulnerability in the Bluetooth Low Energy advertisement scan response in Blue…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Bluetooth Bluetooth Core SpecificationRace Condition

First published (updated )

Bluetooth Mesh profileMesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, able to co…

7.5
First published (updated )

Bluetooth Mesh profileMesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (without po…

7.5
First published (updated )

Bluetooth Mesh profileBluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device (…

8.8
First published (updated )

Bluetooth Mesh profileBluetooth Mesh Provisioning in the Bluetooth Mesh profile 1.0 and 1.0.1 may permit a nearby device, …

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

redhat/bluezLast updated 25 October 2024

First published (updated )

Intel Ax210 FirmwareLast updated 25 October 2024

First published (updated )

Bluetooth Bluetooth Core SpecificationDevices supporting Bluetooth before 5.1 may allow man-in-the-middle attacks, aka BLURtooth. Cross Tr…

First published (updated )

Bluetooth Bluetooth CoreBluetooth devices supporting LE and specific BR/EDR implementations are vulnerable to method confusion attacks

First published (updated )

Bluetooth Bluetooth CoreBluetooth devices supporting BR/EDR v5.2 and earlier are vulnerable to impersonation attacks

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows VistaCode Injection

8.8
First published (updated )

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203