Page 17 of 177 results (0.002 seconds)

CVSS: 6.7EPSS: 0%CPEs: 44EXPL: 0

In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310743; Issue ID: ALPS07310743. En wlan, se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-787: Out-of-bounds Write •

CVSS: 6.7EPSS: 0%CPEs: 49EXPL: 0

In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425. En wlan, se presenta un posible uso después de libre debido a una comprobación de estado incorrecta. • https://corp.mediatek.com/product-security-bulletin/October-2022 • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 6.6EPSS: 0%CPEs: 46EXPL: 0

In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125. En preloader (usb), se presenta una posible escritura fuera de límites debido a una falta de comprobación de límites. • https://corp.mediatek.com/product-security-bulletin/September-2022 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 44EXPL: 0

In MtkEmail, there is a possible escalation of privilege due to fragment injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07216598; Issue ID: ALPS07216598. En MtkEmail, se presenta una posible escalada de privilegios debido a la inyección de fragmentos. • https://corp.mediatek.com/product-security-bulletin/September-2022 • CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') •

CVSS: 4.4EPSS: 0%CPEs: 21EXPL: 0

In vow, there is a possible information disclosure due to a symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545473; Issue ID: ALPS06545473. En vow, se presenta una posible divulgación de información debido al seguimiento de un enlace simbólico. • https://corp.mediatek.com/product-security-bulletin/September-2022 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •