Page 29 of 230 results (0.003 seconds)

CVSS: 4.4EPSS: 0%CPEs: 55EXPL: 0

In keyinstall, there is a possible information disclosure due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07563028; Issue ID: ALPS07563028. • https://corp.mediatek.com/product-security-bulletin/March-2023 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 6.7EPSS: 0%CPEs: 17EXPL: 0

In vow, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628530; Issue ID: ALPS07628530. • https://corp.mediatek.com/product-security-bulletin/March-2023 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 4.4EPSS: 0%CPEs: 39EXPL: 0

In ril, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628612; Issue ID: ALPS07628612. • https://corp.mediatek.com/product-security-bulletin/March-2023 • CWE-20: Improper Input Validation •

CVSS: 6.7EPSS: 0%CPEs: 39EXPL: 0

In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07628537; Issue ID: ALPS07628537. • https://corp.mediatek.com/product-security-bulletin/March-2023 • CWE-20: Improper Input Validation •

CVSS: 6.7EPSS: 0%CPEs: 43EXPL: 0

In thermal, there is a possible memory corruption due to an uncaught exception. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494460; Issue ID: ALPS07494460. • https://corp.mediatek.com/product-security-bulletin/March-2023 •