Show filters
1,625 Total Results
Displaying 541-550 of 1,625
Sort by:
Attacker Value
Unknown
CVE-2022-28198
Disclosure Date: April 29, 2022 (last updated October 07, 2023)
NVIDIA Omniverse Nucleus and Cache contain a vulnerability in its configuration of OpenSSL, where an attacker with physical access to the system can cause arbitrary code execution which can impact confidentiality, integrity, and availability.
0
Attacker Value
Unknown
CVE-2021-29859
Disclosure Date: April 29, 2022 (last updated October 07, 2023)
IBM ICP4A - User Management System Component (IBM Cloud Pak for Business Automation V21.0.3 through V21.0.3-IF008, V21.0.2 through V21.0.2-IF009, and V21.0.1 through V21.0.1-IF007) could allow a user with physical access to the system to perform unauthorized actions or obtain sensitive information due to insufficient validation and recvocation another user logouting out. IBM X-Force ID: 206081.
0
Attacker Value
Unknown
CVE-2022-24372
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
Linksys MR9600 devices before 2.0.5 allow attackers to read arbitrary files via a symbolic link to the root directory of a NAS SMB share.
0
Attacker Value
Unknown
CVE-2021-25266
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
An insecure data storage vulnerability allows a physical attacker with root privileges to retrieve TOTP secret keys from unlocked phones in Sophos Authenticator for Android version 3.4 and older, and Intercept X for Mobile (Android) before version 9.7.3495.
0
Attacker Value
Unknown
CVE-2022-24885
Disclosure Date: April 27, 2022 (last updated October 07, 2023)
Nextcloud Android app is the Android client for Nextcloud, a self-hosted productivity platform. Prior to version 3.19.1, users can bypass a lock on the Nextcloud app on an Android device by repeatedly reopening the app. Version 3.19.1 contains a fix for the problem. There are currently no known workarounds.
0
Attacker Value
Unknown
CVE-2022-23822
Disclosure Date: April 26, 2022 (last updated October 07, 2023)
In this physical attack, an attacker may potentially exploit the Zynq-7000 SoC First Stage Boot Loader (FSBL) by bypassing authentication and loading a malicious image onto the device. This in turn may further allow the attacker to perform additional attacks such as such as using the device as a decryption oracle. An anticipated mitigation via a 2022.1 patch will resolve the issue.
0
Attacker Value
Unknown
CVE-2022-26865
Disclosure Date: April 26, 2022 (last updated October 07, 2023)
Dell Support Assist OS Recovery versions before 5.5.2 contain an Authentication Bypass vulnerability. An unauthenticated attacker with physical access to the system may exploit this vulnerability by bypassing OS Recovery authentication in order to run arbitrary code on the system as Administrator.
0
Attacker Value
Unknown
CVE-2022-1342
Disclosure Date: April 21, 2022 (last updated October 07, 2023)
A lack of password masking in Devolutions Remote Desktop Manager allows physically proximate attackers to observe sensitive data. A caching issue can cause sensitive fields to sometimes stay revealed when closing and reopening a panel, which could lead to involuntarily disclosing sensitive information. This issue affects: Devolutions Remote Desktop Manager 2022.1.24 version and prior versions.
0
Attacker Value
Unknown
CVE-2022-20731
Disclosure Date: April 13, 2022 (last updated October 07, 2023)
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
0
Attacker Value
Unknown
CVE-2022-20661
Disclosure Date: April 13, 2022 (last updated October 07, 2023)
Multiple vulnerabilities that affect Cisco Catalyst Digital Building Series Switches and Cisco Catalyst Micro Switches could allow an attacker to execute persistent code at boot time or to permanently prevent the device from booting, resulting in a permanent denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
0