Page 15 of 76 results (0.012 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in the Toshiba Bluetooth stack allows remote attackers to gain administrative access (aka Remote Root) via unspecified vectors. Vulnerabilidad no especificada en la pila Bluetooth de Toshiba permite a atacantes remotos obtener acceso administrativo (también conocido como Root Remoto) mediante vectores no especificados. • http://events.ccc.de/congress/2006-mediawiki//images/f/fb/23c3_Bluetooh_revisited.pdf http://osvdb.org/37607 http://www.securityfocus.com/archive/1/455889/100/0/threaded •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Unspecified vulnerability in Toshiba Bluetooth Stack before 4.20.01 has unspecified impact and attack vectors, related to the 4.20.01(T) "Security fix." NOTE: due to the lack of details in the vendor advisory, it is not clear whether this issue is related to CVE-2006-5405. Vulnerabilidad no especificada en Toshiba Bluetooth Stack anterior a 4.20.01 tiene un impacto desconocido y vectores de ataque, relacionados con 4.20.01(T) "Security fix." NOTA: debido a la carencia de detalles del vendedor consultado, no está claro si esta edición está relacionada con CVE-2006-5405. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=bltstack-42001-notebook https://exchange.xforce.ibmcloud.com/vulnerabilities/44391 •

CVSS: 6.2EPSS: 0%CPEs: 2EXPL: 0

Unspecified vulnerability in Toshiba Bluetooth wireless device driver 3.x and 4 through 4.00.35, as used in multiple products, allows physically proximate attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via crafted Bluetooth packets. Vulnerabilidad no especificada en el driver del dispositivo de wireless del Toshiba Bluetooth para las versiones 3.x y 4, hasta la 4.00.35, como el usado en múltiples productos, permite a los atacantes, físicamente próximos causar la denegación de servicio (caída), corrupción de la memoria y la posibilidad de ejecutar código de su elección mediante paquetes Bluetooth artesanales. • http://attrition.org/pipermail/vim/2006-October/001085.html http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html http://secunia.com/advisories/22402 http://securityreason.com/securityalert/1744 http://securitytracker.com/id?1017075 http://www.secureworks.com/press/20061011-dell.html http://www.securityfocus.com/archive/1/448422/100/100/threaded http://www.vupen.com/english/advisories/2006/4057 https://exchange.xforce.ibmcloud.com/vulnerabilities/29503 •

CVSS: 5.0EPSS: 15%CPEs: 15EXPL: 1

The TOSRFBD.SYS driver for Toshiba Bluetooth Stack 4.00.29 and earlier on Windows allows remote attackers to cause a denial of service (reboot) via a L2CAP echo request that triggers an out-of-bounds memory access, similar to "Ping o' Death" and as demonstrated by BlueSmack. NOTE: this issue was originally reported for 4.00.23. El controlador TOSRFBD.SYS para Toshiba Bluetooth Stack v4.00.29 y anteriores en Windows permite a atacantes remotos provocar una denegación de servicio (reinicio) a través de una solicitud L2CAP echo que provoca una acceso "fuera de rango" a memoria, similar al "Ping de la Muerte" tal y como lo demuestra BlueSmack. NOTA: este problema fue reportado originalmente para v4.00.23. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2 http://attrition.org/pipermail/vim/2006-October/001085.html http://briankrebswatch.blogspot.com/2006/10/more-on-toshiba-patches.html http://secunia.com/advisories/20657 http://securitytracker.com/id?1016345 http://trifinite.org/blog/archives/2006/06/update_tosiba_a.html http://trifinite.org/trifinite_advisory_toshiba.html http://www.osvdb.org/26686 http://www.securityfocus.com/archive/1/437811/100/0/threaded http:&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 13EXPL: 1

Directory traversal vulnerability in OBEX Push services in Toshiba Bluetooth Stack 4.00.23(T) and earlier allows remote attackers to upload arbitrary files to arbitrary remote locations specified by .. (dot dot) sequences, as demonstrated by ..\\ sequences in the RFILE argument of ussp-push. Vulnerabilidad de salto de directorio en servicios OBEX Push en Toshiba Bluetooth Stack 4.00.23(T) y versiones anteriores permite a atacantes remotos subir archivos arbitrarios a localizaciones remotas arbitrarias especificadas por secuencias .. (punto punto), según lo demostrado por secuencias ..\\ en el argumento RFILE de ussp-push. • http://aps.toshiba-tro.de/bluetooth/pages/driverinfo.php?txt=sp2 http://marc.info/?l=full-disclosure&m=113712413907526&w=2 http://secunia.com/advisories/18437 http://securitytracker.com/id?1015486 http://www.digitalmunition.com/DMA%5B2006-0112a%5D.txt http://www.osvdb.org/22380 http://www.securityfocus.com/archive/1/421993/100/0/threaded http://www.securityfocus.com/bid/16236 http://www.vupen.com/english/advisories/2006/0184 •