Show filters
1,622 Total Results
Displaying 21-30 of 1,622
Sort by:
Attacker Value
Unknown
CVE-2024-34675
Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Improper access control in Dex Mode prior to SMR Nov-2024 Release 1 allows physical attackers to temporarily access to unlocked screen.
0
Attacker Value
Unknown
CVE-2024-34674
Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Improper access control in Contacts prior to SMR Nov-2024 Release 1 allows physical attackers to access data across multiple user profiles.
0
Attacker Value
Unknown
CVE-2024-10523
Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
0
Attacker Value
Unknown
CVE-2024-44274
Disclosure Date: October 28, 2024 (last updated October 31, 2024)
The issue was addressed with improved authentication. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, iOS 18.1 and iPadOS 18.1. An attacker with physical access to a locked device may be able to view sensitive user information.
0
Attacker Value
Unknown
CVE-2024-44265
Disclosure Date: October 28, 2024 (last updated October 31, 2024)
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
0
Attacker Value
Unknown
CVE-2024-44251
Disclosure Date: October 28, 2024 (last updated October 31, 2024)
This issue was addressed through improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen.
0
Attacker Value
Unknown
CVE-2024-44235
Disclosure Date: October 28, 2024 (last updated October 30, 2024)
The issue was addressed with improved checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen.
0
Attacker Value
Unknown
CVE-2024-44137
Disclosure Date: October 28, 2024 (last updated October 30, 2024)
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An attacker with physical access may be able to share items from the lock screen.
0
Attacker Value
Unknown
CVE-2024-40851
Disclosure Date: October 28, 2024 (last updated October 30, 2024)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker with physical access may be able to access contact photos from the lock screen.
0
Attacker Value
Unknown
CVE-2024-49934
Disclosure Date: October 21, 2024 (last updated November 14, 2024)
In the Linux kernel, the following vulnerability has been resolved:
fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name
It's observed that a crash occurs during hot-remove a memory device,
in which user is accessing the hugetlb. See calltrace as following:
------------[ cut here ]------------
WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790
Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s
mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:do_user_addr_fault+0x2a0/0x790
Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 4…
0