Page 2 of 24 results (0.003 seconds)

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

13 Sep 2024 — BT: Classic: SDP OOB access in get_att_search_list • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-pm38-7g85-cf4f • CWE-20: Improper Input Validation CWE-121: Stack-based Buffer Overflow CWE-787: Out-of-bounds Write •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

13 Sep 2024 — BT:Classic: Multiple missing buf length checks • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp • CWE-122: Heap-based Buffer Overflow •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

13 Sep 2024 — BT: Unchecked user input in bap_broadcast_assistant • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-r8h3-64gp-wv7f • CWE-20: Improper Input Validation CWE-121: Stack-based Buffer Overflow •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

13 Sep 2024 — BT: Missing length checks of net_buf in rfcomm_handle_data • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7833-fcpm-3ggm • CWE-20: Improper Input Validation CWE-122: Heap-based Buffer Overflow CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

13 Sep 2024 — BT: Encryption procedure host vulnerability • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gvv5-66hw-5qrc • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

19 Aug 2024 — BT: Missing Check in LL_CONNECTION_UPDATE_IND Packet Leads to Division by Zero • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xcr5-5g98-mchp • CWE-20: Improper Input Validation CWE-369: Divide By Zero •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

03 Jul 2024 — A malicious BLE device can send a specific order of packet sequence to cause a DoS attack on the victim BLE device • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jmr9-xw2v-5vf4 • CWE-476: NULL Pointer Dereference •

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

29 Mar 2024 — An malicious BLE device can crash BLE victim device by sending malformed gatt packet Un dispositivo BLE malicioso puede bloquear el dispositivo víctima de BLE al enviar un paquete gatt con formato incorrecto • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gmfv-4vfh-2mh8 • CWE-126: Buffer Over-read CWE-190: Integer Overflow or Wraparound •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

15 Mar 2024 — Zephyr OS IP packet handling does not properly drop IP packets arriving on an external interface with a source address equal to 127.0.01 or the destination address. El manejo de paquetes IP de Zephyr OS no descarta adecuadamente los paquetes IP que llegan a una interfaz externa con una dirección de origen igual a 127.0.01 o la dirección de destino. • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fjc8-223c-qgqr • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

20 Feb 2024 — Possible buffer overflow in is_mount_point Posible desbordamiento de búfer en is_mount_point • https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •