Page 5 of 49 results (0.002 seconds)

CVSS: 6.7EPSS: 0%CPEs: 48EXPL: 0

03 May 2022 — In aee driver, there is a possible memory corruption due to active debug code. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06240397; Issue ID: ALPS06240397. En aee driver, se presenta una posible corrupción de memoria debido al código de depuración activo. • https://corp.mediatek.com/product-security-bulletin/May-2022 •

CVSS: 7.8EPSS: 0%CPEs: 47EXPL: 0

03 May 2022 — In aee driver, there is a possible reference count mistake due to incorrect error handling. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06209201; Issue ID: ALPS06209201. En aee driver, se presenta un posible error en el recuento de referencias debido a un manejo incorrecto de errores. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 6.7EPSS: 0%CPEs: 54EXPL: 0

03 May 2022 — In netdiag, there is a possible symbolic link following due to an improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06308877; Issue ID: ALPS06308877. En netdiag, se presenta un posible seguimiento de enlaces simbólicos debido a una resolución de enlaces inapropiada. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.0EPSS: 0%CPEs: 56EXPL: 0

03 May 2022 — In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901. En ion, se presenta un posible uso de memoria previamente liberada debido a una condición de carrera. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 56EXPL: 0

03 May 2022 — In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915. En ion, se presenta un posible uso de memoria previamente liberada debido a la actualización inapropiada del recuento de referencias. • https://corp.mediatek.com/product-security-bulletin/May-2022 •

CVSS: 6.6EPSS: 0%CPEs: 46EXPL: 0

11 Apr 2022 — In preloader (usb), there is a possible out of bounds write due to a integer underflow. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160841; Issue ID: ALPS06160841. En preloader (usb), se presenta una posible escritura fuera de límites debido a un desbordamiento de enteros. • https://corp.mediatek.com/product-security-bulletin/April-2022 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 6.6EPSS: 0%CPEs: 49EXPL: 0

11 Apr 2022 — In preloader (usb), there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160425; Issue ID: ALPS06160425. En preloader (usb), se presenta una posible escritura fuera de límites debido a un desbordamiento de enteros. • https://corp.mediatek.com/product-security-bulletin/April-2022 • CWE-190: Integer Overflow or Wraparound •

CVSS: 4.4EPSS: 0%CPEs: 22EXPL: 0

11 Apr 2022 — In atf (hwfde), there is a possible leak of sensitive information due to incorrect error handling. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06171729; Issue ID: ALPS06171729. En atf (hwfde), se presenta un posible filtrado de información confidencial debido a un manejo incorrecto de errores. • https://corp.mediatek.com/product-security-bulletin/May-2022 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 6.7EPSS: 0%CPEs: 50EXPL: 0

09 Mar 2022 — In connsyslogger, there is a possible symbolic link following due to improper link resolution. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06335038; Issue ID: ALPS06335038. En connsyslogger, se presenta un posible seguimiento de enlaces simbólicos debido a una resolución inapropiada de enlaces. • https://corp.mediatek.com/product-security-bulletin/March-2022 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •