Bug | Description |
---|
CVE-2023-28488 | client.c in gdhcp in ConnMan through 1.41 could be used by network-adj ... |
CVE-2022-32293 | In ConnMan through 1.41, a man-in-the-middle attack against a WISPR HT ... |
CVE-2022-32292 | In ConnMan through 1.41, remote attackers able to send HTTP requests t ... |
CVE-2022-23098 | An issue was discovered in the DNS proxy in Connman through 1.40. The ... |
CVE-2022-23097 | An issue was discovered in the DNS proxy in Connman through 1.40. forw ... |
CVE-2022-23096 | An issue was discovered in the DNS proxy in Connman through 1.40. The ... |
CVE-2021-33833 | ConnMan (aka Connection Manager) 1.30 through 1.39 has a stack-based b ... |
CVE-2021-26676 | gdhcp in ConnMan before 1.39 could be used by network-adjacent attacke ... |
CVE-2021-26675 | A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could ... |
CVE-2017-12865 | Stack-based buffer overflow in "dnsproxy.c" in connman 1.34 and earlie ... |
CVE-2012-6459 | ConnMan 1.3 on Tizen continues to list the bluetooth service after off ... |
CVE-2012-2322 | Integer overflow in the dhcpv6_get_option function in gdhcp/client.c i ... |
CVE-2012-2321 | The loopback plug-in in ConnMan before 0.85 allows remote attackers to ... |
CVE-2012-2320 | ConnMan before 0.85 does not ensure that netlink messages originate fr ... |