Total vulnerabilities in the database
hidd in BlueZ (bluez-utils) before 2.25 allows remote attackers to obtain control of the (1) Mouse and (2) Keyboard Human Interface Device (HID) via a certain configuration of two HID (PSM) endpoints, operating as a server, aka HidAttack.
Software | From | Fixed in |
---|---|---|
bluez_project / bluez | - | 2.24.x |