Page(s) : 1 ... 3 4 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23 ... | Result(s) : 8025 |
Alerts
DATE | NAME | CATEGORIES | DETAIL | |
---|---|---|---|---|
3.9 | 2023-08-16 | CVE-2023-32453 | cve | Dell BIOS contains an improper authentication vulnerability. A malicious user with physical access to the system may potentially exploit this vulnerability in order to modify a... |
2.4 | 2023-08-15 | CVE-2023-39842 | cve | Missing encryption in the RFID tag of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device. |
2.4 | 2023-08-15 | CVE-2023-39843 | cve | Missing encryption in the RFID tag of Suleve 5-in-1 Smart Door Lock v1.0 allows attackers to create a cloned tag via brief physical proximity to the original device. |
3.3 | 2023-08-14 | CVE-2023-21232 | cve | In multiple locations, there is a possible way to retrieve sensor data without permissions due to a permissions bypass. This could lead to local information disclosure with no a... |
3.3 | 2023-08-14 | CVE-2023-21278 | cve | In multiple locations, there is a possible way to obscure the microphone privacy indicator due to a logic error in the code. This could lead to local escalation of privilege wit... |
3.3 | 2023-08-14 | CVE-2022-32876 | cve | A logic issue was addressed with improved restrictions. This issue is fixed in macOS Ventura 13. A shortcut may be able to view the hidden photos album without authentication. |
2.4 | 2023-08-14 | CVE-2022-46724 | cve | This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.4 and iPadOS 16.4. A person with physical access to an iOS device may b... |
2.7 | 2023-08-11 | CVE-2023-4304 | cve | Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.22,2.1.0. |
3.3 | 2023-08-10 | CVE-2023-30682 | cve | Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call silenceRinger API without permission. |
3.3 | 2023-08-10 | CVE-2023-30683 | cve | Improper access control in Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call endCall API without permission. |
3.3 | 2023-08-10 | CVE-2023-30684 | cve | Improper access control in Samsung Telecom prior to SMR Aug-2023 Release 1 allows local attackers to call acceptRingingCall API without permission. |
3.3 | 2023-08-10 | CVE-2023-30685 | cve | Improper access control vulnerability in Telecom prior to SMR Aug-2023 Release 1 allows local attakcers to change TTY mode. |
3.3 | 2023-08-10 | CVE-2023-30700 | cve | PendingIntent hijacking vulnerability in SemWifiApTimeOutImpl in framework prior to SMR Aug-2023 Release 1 allows local attackers to access ContentProvider without proper permis... |
3.3 | 2023-08-09 | CVE-2023-39341 | cve | "FFRI yarai", "FFRI yarai Home and Business Edition" and their OEM products handle exceptional conditions improperly, which may lead to denial-of-service (DoS) condition. Affe... |
3.6 | 2023-08-08 | CVE-2023-39342 | cve | Dangerzone is software for converting potentially dangerous PDFs, office documents, or images to safe PDFs. The Dangerzone CLI (`dangerzone-cli` command) logs output from the co... |
3.3 | 2023-08-08 | CVE-2023-39978 | cve | ImageMagick before 6.9.12-91 allows attackers to cause a denial of service (memory consumption) in Magick::Draw. |
3.7 | 2023-08-04 | CVE-2023-38700 | cve | matrix-appservice-irc is a Node.js IRC bridge for Matrix. Prior to version 1.0.1, it was possible to craft an event such that it would leak part of a targeted message event from... |
3.3 | 2023-08-03 | CVE-2023-3669 | cve | A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import di... |
3.1 | 2023-08-03 | CVE-2023-26979 | cve | Bluetens Electrostimulation Device BluetensQ device app version 4.3.15 is vulnerable to Man-in-the-middle attacks in the BLE channel. It allows attackers to decrease or increase... |
3.1 | 2023-08-02 | CVE-2023-26438 | cve | External service lookups for a number of protocols were vulnerable to a time-of-check/time-of-use (TOCTOU) weakness, involving the JDK DNS cache. Attackers that were timing DNS ... |
Page(s) : 1 ... 3 4 5 6 7 8 9 10 11 12 [13] 14 15 16 17 18 19 20 21 22 23 ... | Result(s) : 8025 |