Show filters
1,625 Total Results
Displaying 471-480 of 1,625
Sort by:
Attacker Value
Unknown
CVE-2022-33955
Disclosure Date: July 29, 2022 (last updated October 08, 2023)
IBM CICS TX 11.1 could allow allow an attacker with physical access to the system to execute code due using a back and refresh attack. IBM X-Force ID: 229312.
0
Attacker Value
Unknown
CVE-2022-30316
Disclosure Date: July 28, 2022 (last updated October 08, 2023)
Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0054, there is a Honeywell Experion PKS Safety Manager unauthenticated firmware update issue. The affected components are characterized as: Firmware update functionality. The potential impact is: Firmware manipulation. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 communication FTA serial interface and Enea POLO bootloader for firmware management purposes. An engineering workstation running the Safety Builder software communicates via serial or serial-over-ethernet link with the DCOM-232/485 interface. Firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. Firmware images are unsigned. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize hardcoded cre…
0
Attacker Value
Unknown
CVE-2022-30314
Disclosure Date: July 28, 2022 (last updated October 08, 2023)
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).
0
Attacker Value
Unknown
CVE-2022-22412
Disclosure Date: July 25, 2022 (last updated October 07, 2023)
IBM Robotic Process Automation 21.0.0, 21.0.1, and 21.0.2 could allow a user with access to the local host (client machine) to obtain a login access token. IBM X-Force ID: 223019.
0
Attacker Value
Unknown
CVE-2022-1132
Disclosure Date: July 23, 2022 (last updated October 07, 2023)
Inappropriate implementation in Virtual Keyboard in Google Chrome on Chrome OS prior to 100.0.4896.60 allowed a local attacker to bypass navigation restrictions via physical access to the device.
0
Attacker Value
Unknown
CVE-2021-33656
Disclosure Date: July 18, 2022 (last updated October 07, 2023)
When setting font with malicous data by ioctl cmd PIO_FONT,kernel will write memory out of bounds.
0
Attacker Value
Unknown
CVE-2022-29083
Disclosure Date: July 13, 2022 (last updated October 08, 2023)
Prior Dell BIOS versions contain an Improper Authentication vulnerability. An unauthenticated attacker with physical access to the system could potentially exploit this vulnerability by bypassing drive security mechanisms in order to gain access to the system.
0
Attacker Value
Unknown
CVE-2022-30203
Disclosure Date: July 12, 2022 (last updated December 20, 2023)
Windows Boot Manager Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2022-22023
Disclosure Date: July 12, 2022 (last updated December 20, 2023)
Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2022-35648
Disclosure Date: July 12, 2022 (last updated October 07, 2023)
Nautilus treadmills T616 S/N 100672PRO21140001 through 100672PRO21171980 and T618 S/N 100647PRO21130111 through 100647PRO21183960 with software before 2022-06-09 allow physically proximate attackers to cause a denial of service (fall) by connecting the power cord to a 120V circuit (which may lead to self-starting at an inopportune time).
0