Total vulnerabilities in the database
Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access.
Software | From | Fixed in |
---|---|---|
bluez / bluez | - | 5.57 |
redhat / enterprise_linux | 7.0 | 7.0.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
debian / debian_linux | 9.0 | 9.0.x |