Total vulnerabilities in the database
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 5.9.0-rc1 | 5.9.0-rc1.x |
linux / linux_kernel | 5.9.0-rc2 | 5.9.0-rc2.x |
linux / linux_kernel | 5.9.0-rc3 | 5.9.0-rc3.x |
linux / linux_kernel | 5.9.0 | 5.9.0.x |
linux / linux_kernel | 5.9.0-rc4 | 5.9.0-rc4.x |
linux / linux_kernel | 5.9.0-rc5 | 5.9.0-rc5.x |
linux / linux_kernel | 5.9.0-rc6 | 5.9.0-rc6.x |
linux / linux_kernel | 5.5 | 5.8.16 |
linux / linux_kernel | 4.20 | 5.4.72 |
linux / linux_kernel | 4.15 | 4.19.152 |
linux / linux_kernel | 4.10 | 4.14.202 |
linux / linux_kernel | 4.7.7 | 4.9.240 |
linux / linux_kernel | 5.9.1 | 5.9.1.x |