Page 36 of 452 results (0.011 seconds)

CVSS: 4.4EPSS: 0%CPEs: 20EXPL: 0

06 Jun 2022 — In imgsensor, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479698; Issue ID: ALPS06479698. En imgsensor, se presenta una posible lectura fuera de límites debido a una falta de comprobación de límites. • https://corp.mediatek.com/product-security-bulletin/June-2022 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 0%CPEs: 46EXPL: 0

06 Jun 2022 — In WIFI Firmware, there is a possible memory corruption due to a use after free. This could lead to remote escalation of privilege, when devices are connecting to the attacker-controllable Wi-Fi hotspot, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06468872; Issue ID: ALPS06468872. En WIFI Firmware, se presenta una posible corrupción de memoria debido a un uso de memoria previamente liberada. • https://corp.mediatek.com/product-security-bulletin/June-2022 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 56EXPL: 0

03 May 2022 — In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108. En ion, se presenta un posible uso de memoria previamente liberada debido a un desbordamiento de enteros. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.4EPSS: 0%CPEs: 56EXPL: 0

03 May 2022 — In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069. En ion, se presenta un posible uso de memoria previamente liberada debido a un manejo incorrecto de errores. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 5.5EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible information disclosure due to improper access control. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06284104. En aee daemon, se presenta una posible divulgación de información debido a un control de acceso inapropiado. • https://corp.mediatek.com/product-security-bulletin/May-2022 •

CVSS: 4.4EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible information disclosure due to symbolic link following. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06282684. En aee daemon, se presenta una posible divulgación de información debido a un seguimiento de enlaces simbólicos. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 4.4EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296405. En aee daemon, se presenta una posible divulgación de información debido a una falta de comprobación de permisos. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-862: Missing Authorization •

CVSS: 5.5EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible information disclosure due to a path traversal. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419017; Issue ID: ALPS06270870. En aee daemon, se presenta una posible divulgación de información debido a un salto de ruta. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 4.4EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06383944; Issue ID: ALPS06270804. En aee daemon, se presenta una posible divulgación de información debido a una falta de comprobación de permisos. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-862: Missing Authorization •

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 0

03 May 2022 — In aee daemon, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06296442; Issue ID: ALPS06296442. En aee daemon, es posible que se produzca una escritura fuera de límites debido a una comprobación de entrada inapropiada. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-787: Out-of-bounds Write •