Download
| Alert*
oval:org.secpod.oval:def:612875
It was reported that the BlueZ"s HID profile implementation is not inline with the HID specification which mandates the use of Security Mode 4. The HID profile configuration option ClassicBondedOnly now defaults to true to make sure that input connections only come from bonded device connections. oval:org.secpod.oval:def:96935 It was reported that the BlueZ"s HID profile implementation is not inline with the HID specification which mandates the use of Security Mode 4. The HID profile configuration option ClassicBondedOnly now defaults to true to make sure that input connections only come from bonded device connections. oval:org.secpod.oval:def:19500560 bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution oval:org.secpod.oval:def:126867 Utilities for use in Bluetooth applications: - avinfo - bluemoon - bluetoothctl - bluetoothd - btattach - btmon - hex2hcd - l2ping - l2test - mpris-proxy - rctest The BLUETOOTH trademarks are owned by Bluetooth SIG, Inc., U.S.A. oval:org.secpod.oval:def:1702007 bluez: unauthorized HID device connections allows keystroke injection and arbitrary commands execution oval:org.secpod.oval:def:126863 Utilities for use in Bluetooth applications: - avinfo - bluemoon - bluetoothctl - bluetoothd - btattach - btmon - hex2hcd - l2ping - l2test - mpris-proxy - rctest The BLUETOOTH trademarks are owned by Bluetooth SIG, Inc., U.S.A. oval:org.secpod.oval:def:96783 bluez: Bluetooth tools and daemons BlueZ could be made to give a physically proximate attacker keyboard and mouse control of a computer. oval:org.secpod.oval:def:95755 The host is installed with Apple Mac OS 14 before 14.2 and is prone to a spoofing vulnerability. A flaw is present in the application, which fails to properly handle issues in improved checks. On successful exploitation, an attacker in a privileged network position may be able to inject keystrokes b ... oval:org.secpod.oval:def:708649 bluez: Bluetooth tools and daemons BlueZ could be made to give a physically proximate attacker keyboard and mouse control of a computer. oval:org.secpod.oval:def:95718 The host is missing a security update according to Apple advisory. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues in various components. Successful exploitation allow attackers to execute arbitrary, cause denial ... |