Show filters
1,624 Total Results
Displaying 351-360 of 1,624
Sort by:
Attacker Value
Unknown
CVE-2023-20012
Disclosure Date: February 23, 2023 (last updated October 08, 2023)
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
0
Attacker Value
Unknown
CVE-2023-23039
Disclosure Date: February 22, 2023 (last updated October 08, 2023)
An issue was discovered in the Linux kernel through 6.2.0-rc2. drivers/tty/vcc.c has a race condition and resultant use-after-free if a physically proximate attacker removes a VCC device while calling open(), aka a race condition between vcc_open() and vcc_remove().
0
Attacker Value
Unknown
CVE-2022-36287
Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Uncaught exception in the FCS Server software maintained by Intel before version 1.1.79.3 may allow a privileged user to potentially enable denial of service via physical access.
0
Attacker Value
Unknown
CVE-2023-24499
Disclosure Date: February 15, 2023 (last updated October 08, 2023)
Butterfly Button plugin may leave traces of its use on user's device. Since it is used for reporting domestic problems, this may lead to spouse knowing about its use.
0
Attacker Value
Unknown
CVE-2023-25758
Disclosure Date: February 14, 2023 (last updated October 08, 2023)
Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
0
Attacker Value
Unknown
CVE-2023-0808
Disclosure Date: February 13, 2023 (last updated October 20, 2023)
A vulnerability was found in Deye/Revolt/Bosswerk Inverter MW3_15U_5406_1.47/MW3_15U_5406_1.471. It has been rated as problematic. This issue affects some unknown processing of the component Access Point Setting Handler. The manipulation with the input 12345678 leads to use of hard-coded password. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version MW3_16U_5406_1.53 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-220769 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2022-24410
Disclosure Date: February 10, 2023 (last updated November 08, 2023)
Dell BIOS contains an information exposure vulnerability. An unauthenticated local attacker with physical access to the system and knowledge of the system configuration could potentially exploit this vulnerability to read system information via debug interfaces.
0
Attacker Value
Unknown
CVE-2023-21450
Disclosure Date: February 09, 2023 (last updated October 08, 2023)
Missing Authorization vulnerability in One Hand Operation + prior to version 6.1.21 allows multi-users to access owner's widget without authorization via gesture setting.
0
Attacker Value
Unknown
CVE-2023-21438
Disclosure Date: February 09, 2023 (last updated October 08, 2023)
Improper logic in HomeScreen prior to SMR Feb-2023 Release 1 allows physical attacker to access App preview protected by Secure Folder.
0
Attacker Value
Unknown
CVE-2022-39043
Disclosure Date: February 08, 2023 (last updated October 08, 2023)
Juiker app stores debug logs which contains sensitive information to mobile external storage. An unauthenticated physical attacker can access these files to acquire partial user information such as personal contacts.
0