Auto-Update: 2024-10-07T04:00:16.856852+00:00

This commit is contained in:
cad-safe-bot 2024-10-07 04:03:16 +00:00
parent 5559c5eef7
commit d93b8745bb
16 changed files with 497 additions and 10 deletions

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20090",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.430",
"lastModified": "2024-10-07T03:15:02.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1703."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20091",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.583",
"lastModified": "2024-10-07T03:15:02.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1701."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20092",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.680",
"lastModified": "2024-10-07T03:15:02.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1700."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20093",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.757",
"lastModified": "2024-10-07T03:15:02.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1699."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20094",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.823",
"lastModified": "2024-10-07T03:15:02.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Modem, there is a possible system crash due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00843282; Issue ID: MSV-1535."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20095",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.910",
"lastModified": "2024-10-07T03:15:02.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996894; Issue ID: MSV-1636."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20096",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:02.987",
"lastModified": "2024-10-07T03:15:02.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996900; Issue ID: MSV-1635."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20097",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.057",
"lastModified": "2024-10-07T03:15:03.057",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09028313; Issue ID: MSV-1630."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20098",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.127",
"lastModified": "2024-10-07T03:15:03.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08996886; Issue ID: MSV-1626."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20099",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.200",
"lastModified": "2024-10-07T03:15:03.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08997492; Issue ID: MSV-1625."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20100",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.273",
"lastModified": "2024-10-07T03:15:03.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998449; Issue ID: MSV-1603."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20101",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.350",
"lastModified": "2024-10-07T03:15:03.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998901; Issue ID: MSV-1602."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20102",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.427",
"lastModified": "2024-10-07T03:15:03.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan driver, there is a possible out of bounds read due to improper input validation. This could lead to remote information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998892; Issue ID: MSV-1601."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20103",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-10-07T03:15:03.500",
"lastModified": "2024-10-07T03:15:03.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wlan firmware, there is a possible out of bounds write due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001358; Issue ID: MSV-1599."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/October-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-07T02:00:17.015950+00:00
2024-10-07T04:00:16.856852+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-07T01:15:14.970000+00:00
2024-10-07T03:15:03.500000+00:00
```
### Last Data Feed Release
@ -33,16 +33,27 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264694
264708
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `14`
- [CVE-2024-9563](CVE-2024/CVE-2024-95xx/CVE-2024-9563.json) (`2024-10-07T00:15:02.813`)
- [CVE-2024-9564](CVE-2024/CVE-2024-95xx/CVE-2024-9564.json) (`2024-10-07T01:15:14.697`)
- [CVE-2024-9565](CVE-2024/CVE-2024-95xx/CVE-2024-9565.json) (`2024-10-07T01:15:14.970`)
- [CVE-2024-20090](CVE-2024/CVE-2024-200xx/CVE-2024-20090.json) (`2024-10-07T03:15:02.430`)
- [CVE-2024-20091](CVE-2024/CVE-2024-200xx/CVE-2024-20091.json) (`2024-10-07T03:15:02.583`)
- [CVE-2024-20092](CVE-2024/CVE-2024-200xx/CVE-2024-20092.json) (`2024-10-07T03:15:02.680`)
- [CVE-2024-20093](CVE-2024/CVE-2024-200xx/CVE-2024-20093.json) (`2024-10-07T03:15:02.757`)
- [CVE-2024-20094](CVE-2024/CVE-2024-200xx/CVE-2024-20094.json) (`2024-10-07T03:15:02.823`)
- [CVE-2024-20095](CVE-2024/CVE-2024-200xx/CVE-2024-20095.json) (`2024-10-07T03:15:02.910`)
- [CVE-2024-20096](CVE-2024/CVE-2024-200xx/CVE-2024-20096.json) (`2024-10-07T03:15:02.987`)
- [CVE-2024-20097](CVE-2024/CVE-2024-200xx/CVE-2024-20097.json) (`2024-10-07T03:15:03.057`)
- [CVE-2024-20098](CVE-2024/CVE-2024-200xx/CVE-2024-20098.json) (`2024-10-07T03:15:03.127`)
- [CVE-2024-20099](CVE-2024/CVE-2024-200xx/CVE-2024-20099.json) (`2024-10-07T03:15:03.200`)
- [CVE-2024-20100](CVE-2024/CVE-2024-201xx/CVE-2024-20100.json) (`2024-10-07T03:15:03.273`)
- [CVE-2024-20101](CVE-2024/CVE-2024-201xx/CVE-2024-20101.json) (`2024-10-07T03:15:03.350`)
- [CVE-2024-20102](CVE-2024/CVE-2024-201xx/CVE-2024-20102.json) (`2024-10-07T03:15:03.427`)
- [CVE-2024-20103](CVE-2024/CVE-2024-201xx/CVE-2024-20103.json) (`2024-10-07T03:15:03.500`)
### CVEs modified in the last Commit

View File

@ -243162,7 +243162,21 @@ CVE-2024-20087,0,0,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48e
CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000
CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000
CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000
CVE-2024-20090,1,1,59a7e52cf7025276a6db0c14ce6f34944a8b0b4113a9c0e29ce7ba382d33e2a8,2024-10-07T03:15:02.430000
CVE-2024-20091,1,1,3bf9ec3c097c0494d871fb82f004ed8098a3af6724efef8dbbb44c8e90385f71,2024-10-07T03:15:02.583000
CVE-2024-20092,1,1,4b0bc83d3f5a5ade48b8ae4c2b6a25b962fc6d494f577ee50b4bc23ed7fbd11f,2024-10-07T03:15:02.680000
CVE-2024-20093,1,1,0950622827f8ba98de91cbaa9f087416b490bf2f1503ed5f0876bf052411c3d8,2024-10-07T03:15:02.757000
CVE-2024-20094,1,1,bfeb2590629355179f40dc2de1de8bd0ce90c49f84b1a2689971bfa348ae314e,2024-10-07T03:15:02.823000
CVE-2024-20095,1,1,c5bdbbbe15ad89d9cd38d7ee1cbacee9974552b35d6ca2e6b413650a298b9a74,2024-10-07T03:15:02.910000
CVE-2024-20096,1,1,d86710c0fc330cd0a2eab8d2c6959311931c71e27f4825ab8ee341cc82a0b5b1,2024-10-07T03:15:02.987000
CVE-2024-20097,1,1,acd4d2c187b5aafc5e0e514df5b7e9937c444450544bc3ae1983c9fc1a505466,2024-10-07T03:15:03.057000
CVE-2024-20098,1,1,3b91e9a2bce2e6ca935506ec99ded8b1cd4890155e2a51f0a29f0bf84eab09ec,2024-10-07T03:15:03.127000
CVE-2024-20099,1,1,fe3971e3e0cbc5dd9ac0e46b3256978f0f9ea7d9dc578f4b48fd955d08d9cf82,2024-10-07T03:15:03.200000
CVE-2024-2010,0,0,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000
CVE-2024-20100,1,1,95736cd45da38eb22c3f53e53856c5431e05acffb84c3eb43f52ff16f15078ea,2024-10-07T03:15:03.273000
CVE-2024-20101,1,1,8894aea24e8bdbc8968a7ba9ece99902a71b7254219070254974a9d278405962,2024-10-07T03:15:03.350000
CVE-2024-20102,1,1,15d459c2a552c3b1c59cc5e200e32d0708217274cdbd2894ca695bf262794e80,2024-10-07T03:15:03.427000
CVE-2024-20103,1,1,f53427faa4bf3b6002c25c7ea540a81a81d07f7bfa3d11c9a0e3ed9688586c1f,2024-10-07T03:15:03.500000
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
@ -264690,6 +264704,6 @@ CVE-2024-9559,0,0,14c71574e54d221dfd41d3891962eb44ce35b99736be50f06ee178248d7fcf
CVE-2024-9560,0,0,1b359e75a1bdb1c0a062891b3467facb889f5369896509304157b00bfc95b262,2024-10-06T22:15:02.677000
CVE-2024-9561,0,0,fb80df5bbb44f1db459d08375318f0da50fc17ac1f28184f098b2516f3b692cf,2024-10-06T23:15:12.150000
CVE-2024-9562,0,0,4766621896d68d5ec09c83dd832c396be9eb1eb6e7926664ccf27962236d6054,2024-10-06T23:15:12.437000
CVE-2024-9563,1,1,248e7f96012d360f5ca1c8bd22f68a33f5cdb4f47d1ac28671bac89e513ac6e9,2024-10-07T00:15:02.813000
CVE-2024-9564,1,1,cb620b0c4416c672d36b74953d03783bfa078e42257f95ad7c0855ccea27be4a,2024-10-07T01:15:14.697000
CVE-2024-9565,1,1,d5d075c95d405fd6033b8c1125f9fc528a63da102e561b30dfda733635129fee,2024-10-07T01:15:14.970000
CVE-2024-9563,0,0,248e7f96012d360f5ca1c8bd22f68a33f5cdb4f47d1ac28671bac89e513ac6e9,2024-10-07T00:15:02.813000
CVE-2024-9564,0,0,cb620b0c4416c672d36b74953d03783bfa078e42257f95ad7c0855ccea27be4a,2024-10-07T01:15:14.697000
CVE-2024-9565,0,0,d5d075c95d405fd6033b8c1125f9fc528a63da102e561b30dfda733635129fee,2024-10-07T01:15:14.970000

Can't render this file because it is too large.