Show filters
1,622 Total Results
Displaying 21-30 of 1,622
Sort by:
Attacker Value
Unknown

CVE-2024-34675

Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Improper access control in Dex Mode prior to SMR Nov-2024 Release 1 allows physical attackers to temporarily access to unlocked screen.
Attacker Value
Unknown

CVE-2024-34674

Disclosure Date: November 06, 2024 (last updated November 13, 2024)
Improper access control in Contacts prior to SMR Nov-2024 Release 1 allows physical attackers to access data across multiple user profiles.
Attacker Value
Unknown

CVE-2024-10523

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
Attacker Value
Unknown

CVE-2024-44274

Disclosure Date: October 28, 2024 (last updated October 31, 2024)
The issue was addressed with improved authentication. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, iOS 18.1 and iPadOS 18.1. An attacker with physical access to a locked device may be able to view sensitive user information.
Attacker Value
Unknown

CVE-2024-44265

Disclosure Date: October 28, 2024 (last updated October 31, 2024)
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Ventura 13.7.1, macOS Sonoma 14.7.1. An attacker with physical access can input Game Controller events to apps running on a locked device.
Attacker Value
Unknown

CVE-2024-44251

Disclosure Date: October 28, 2024 (last updated October 31, 2024)
This issue was addressed through improved state management. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen.
Attacker Value
Unknown

CVE-2024-44235

Disclosure Date: October 28, 2024 (last updated October 30, 2024)
The issue was addressed with improved checks. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker may be able to view restricted content from the lock screen.
Attacker Value
Unknown

CVE-2024-44137

Disclosure Date: October 28, 2024 (last updated October 30, 2024)
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An attacker with physical access may be able to share items from the lock screen.
Attacker Value
Unknown

CVE-2024-40851

Disclosure Date: October 28, 2024 (last updated October 30, 2024)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.1 and iPadOS 18.1. An attacker with physical access may be able to access contact photos from the lock screen.
Attacker Value
Unknown

CVE-2024-49934

Disclosure Date: October 21, 2024 (last updated November 14, 2024)
In the Linux kernel, the following vulnerability has been resolved: fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.name It's observed that a crash occurs during hot-remove a memory device, in which user is accessing the hugetlb. See calltrace as following: ------------[ cut here ]------------ WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790 Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s mirror dm_region_hash dm_log dm_mod CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:do_user_addr_fault+0x2a0/0x790 Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 4…