Page 7 of 149 results (0.003 seconds)

CVSS: 6.7EPSS: 0%CPEs: 29EXPL: 0

04 Dec 2023 — In display, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08059081; Issue ID: ALPS08059081. En display, hay una posible lectura fuera de los límites debido a una verificación de los límites incorrecta. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-125: Out-of-bounds Read •

CVSS: 6.7EPSS: 0%CPEs: 24EXPL: 0

04 Dec 2023 — In display, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07929788; Issue ID: ALPS07929788. En display, hay un posible desbordamiento del búfer clásico debido a una verificación de los límites faltantes. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.7EPSS: 0%CPEs: 46EXPL: 0

04 Dec 2023 — In meta, there is a possible classic buffer overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08000473; Issue ID: ALPS08000473. En meta, existe un posible desbordamiento del búfer clásico debido a una verificación de los límites faltantes. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01138453 (MSV-861). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01139296 (MSV-860). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 1%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01130183 (MSV-850). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130204; Issue ID: MOLY01130204 (MSV-849). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01130256; Issue ID: MOLY01130256 (MSV-848). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 7.8EPSS: 2%CPEs: 36EXPL: 0

04 Dec 2023 — In 5G Modem, there is a possible system crash due to improper error handling. This could lead to remote denial of service when receiving malformed RRC messages, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01128524; Issue ID: MOLY01128524 (MSV-846). En 5G Modem, existe una posible falla del sistema debido a un manejo inadecuado de errores. • https://corp.mediatek.com/product-security-bulletin/December-2023 • CWE-617: Reachable Assertion •

CVSS: 4.4EPSS: 0%CPEs: 11EXPL: 0

04 Dec 2023 — In GZ, there is a possible information disclosure due to a missing data erasing. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07806008; Issue ID: ALPS07806008. En GZ existe una posible divulgación de información debido a la falta de eliminación de datos. • https://corp.mediatek.com/product-security-bulletin/December-2023 •