
CVE-2021-0620
https://notcve.org/view.php?id=CVE-2021-0620
18 Nov 2021 — In asf extractor, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05489178; Issue ID: ALPS05561381. En asf extractor, se presenta una posible lectura fuera de límites debido a un desbordamiento del búfer de la pila. • https://corp.mediatek.com/product-security-bulletin/November-2021 • CWE-125: Out-of-bounds Read •

CVE-2021-0619
https://notcve.org/view.php?id=CVE-2021-0619
18 Nov 2021 — In ape extractor, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05561395; Issue ID: ALPS05561395. En ape extractor, se presenta una posible lectura fuera de límites debido a la falta de comprobación de los límites. • https://corp.mediatek.com/product-security-bulletin/November-2021 • CWE-125: Out-of-bounds Read •

CVE-2021-0672
https://notcve.org/view.php?id=CVE-2021-0672
18 Nov 2021 — In Browser app, there is a possible information disclosure due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-199678035 En la aplicación Browser, existe una posible divulgación de información debido a la falta de comprobación de permisos. Esto podría conducir a la divulgación de información local sin necesidad de privilegios de eje... • https://source.android.com/security/bulletin/2021-11-01 • CWE-862: Missing Authorization •

CVE-2019-15027
https://notcve.org/view.php?id=CVE-2019-15027
14 Aug 2019 — The MediaTek Embedded Multimedia Card (eMMC) subsystem for Android on MT65xx, MT66xx, and MT8163 SoC devices allows attackers to execute arbitrary commands as root via shell metacharacters in a filename under /data, because clear_emmc_nomedia_entry in platform/mt6577/external/meta/emmc/meta_clr_emmc.c invokes 'system("/system/bin/rm -r /data/' followed by this filename upon an eMMC clearance from a Meta Mode boot. NOTE: compromise of Fire OS on the Amazon Echo Dot would require a second hypothetical vulnera... • https://dojo.bullguard.com/dojo-by-bullguard/blog/gaining-rooting-primitives-for-android-mediatek-chips • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •