Show filters
1,625 Total Results
Displaying 511-520 of 1,625
Sort by:
Attacker Value
Unknown
CVE-2022-30729
Disclosure Date: June 07, 2022 (last updated October 07, 2023)
Implicit Intent hijacking vulnerability in Settings prior to SMR Jun-2022 Release 1 allows attackers to get Wi-Fi SSID and password via a malicious QR code scanner.
0
Attacker Value
Unknown
CVE-2022-1716
Disclosure Date: June 02, 2022 (last updated October 07, 2023)
Keep My Notes v1.80.147 allows an attacker with physical access to the victim's device to bypass the application's password/pin lock to access user data. This is possible due to lack of adequate security controls to prevent dynamic code manipulation.
0
Attacker Value
Unknown
CVE-2022-1789
Disclosure Date: June 02, 2022 (last updated October 07, 2023)
With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
0
Attacker Value
Unknown
CVE-2022-30277
Disclosure Date: May 31, 2022 (last updated October 07, 2023)
BD Synapsys™, versions 4.20, 4.20 SR1, and 4.30, contain an insufficient session expiration vulnerability. If exploited, threat actors may be able to access, modify or delete sensitive information, including electronic protected health information (ePHI), protected health information (PHI) and personally identifiable information (PII).
0
Attacker Value
Unknown
CVE-2022-26703
Disclosure Date: May 26, 2022 (last updated October 07, 2023)
An authorization issue was addressed with improved state management. This issue is fixed in iOS 15.5 and iPadOS 15.5. A person with physical access to an iOS device may be able to access photos from the lock screen.
0
Attacker Value
Unknown
CVE-2022-29402
Disclosure Date: May 25, 2022 (last updated October 07, 2023)
TP-Link TL-WR840N EU v6.20 was discovered to contain insecure protections for its UART console. This vulnerability allows attackers to connect to the UART port via a serial connection and execute commands as the root user without authentication.
0
Attacker Value
Unknown
CVE-2022-22309
Disclosure Date: May 23, 2022 (last updated October 07, 2023)
The POWER systems FSP is vulnerable to unauthenticated logins through the serial port/TTY interface. This vulnerability can be more critical if the serial port is connected to a serial-over-lan device. IBM X-Force ID: 217095.
0
Attacker Value
Unknown
CVE-2022-30111
Disclosure Date: May 18, 2022 (last updated October 07, 2023)
Due to the use of an insecure algorithm for rolling codes in MCK Smartlock 1.0, allows attackers to unlock the mechanism via replay attacks.
0
Attacker Value
Unknown
CVE-2021-42849
Disclosure Date: May 18, 2022 (last updated October 07, 2023)
A weak default password for the serial port was reported in some Lenovo Personal Cloud Storage devices that could allow unauthorized device access to an attacker with physical access.
0
Attacker Value
Unknown
CVE-2022-29587
Disclosure Date: May 16, 2022 (last updated October 07, 2023)
Konica Minolta bizhub MFP devices before 2022-04-14 have an internal Chromium browser that executes with root (aka superuser) access privileges.
0