Show filters
1,622 Total Results
Displaying 221-230 of 1,622
Sort by:
Attacker Value
Unknown
CVE-2023-47233
Disclosure Date: November 03, 2023 (last updated November 15, 2023)
The brcm80211 component in the Linux kernel through 6.5.10 has a brcmf_cfg80211_detach use-after-free in the device unplugging (disconnect the USB by hotplug) code. For physically proximate attackers with local access, this "could be exploited in a real world scenario." This is related to brcmf_cfg80211_escan_timeout_worker in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c.
0
Attacker Value
Unknown
CVE-2023-36620
Disclosure Date: November 03, 2023 (last updated November 15, 2023)
An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup="false" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API.
0
Attacker Value
Unknown
CVE-2023-41096
Disclosure Date: October 26, 2023 (last updated September 26, 2024)
Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)
allows potential modification or extraction of network credentials stored in flash.
This issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.
0
Attacker Value
Unknown
CVE-2023-41997
Disclosure Date: October 25, 2023 (last updated November 03, 2023)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
0
Attacker Value
Unknown
CVE-2023-41989
Disclosure Date: October 25, 2023 (last updated November 03, 2023)
The issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1. An attacker may be able to execute arbitrary code as root from the Lock Screen.
0
Attacker Value
Unknown
CVE-2023-41988
Disclosure Date: October 25, 2023 (last updated November 03, 2023)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
0
Attacker Value
Unknown
CVE-2023-41982
Disclosure Date: October 25, 2023 (last updated November 03, 2023)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
0
Attacker Value
Unknown
CVE-2023-4693
Disclosure Date: October 25, 2023 (last updated May 22, 2024)
An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
0
Attacker Value
Unknown
CVE-2023-45844
Disclosure Date: October 25, 2023 (last updated November 07, 2023)
The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug).
0
Attacker Value
Unknown
CVE-2023-30633
Disclosure Date: October 19, 2023 (last updated November 01, 2023)
An issue was discovered in TrEEConfigDriver in Insyde InsydeH2O with kernel 5.0 through 5.5. It can report false TPM PCR values, and thus mask malware activity. Devices use Platform Configuration Registers (PCRs) to record information about device and software configuration to ensure that the boot process is secure. (For example, Windows uses these PCR measurements to determine device health.) A vulnerable device can masquerade as a healthy device by extending arbitrary values into Platform Configuration Register (PCR) banks. This requires physical access to a target victim's device, or compromise of user credentials for a device. This issue is similar to CVE-2021-42299 (on Surface Pro devices).
0