var-202210-0376
Vulnerability from variot
In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259. Google of Android There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0376", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 1.8, "vendor": "google", "version": "12.0" }, { "model": "android", "scope": "eq", "trust": 1.8, "vendor": "google", "version": "11.0" }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "android", "scope": "eq", "trust": 0.8, "vendor": "google", "version": null }, { "model": "mt6580 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6580 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6739 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6739 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6753 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6753 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6757 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6757 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6763 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6763 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6833 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6833 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6853t android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6853t android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6855 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6855 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6877 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6877 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6893 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6893 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8321 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8321 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8666 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8666 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8675 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8675 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8791 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8791 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8797 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8797 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-32591" } ] }, "cve": "CVE-2022-32591", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CNVD-2022-87959", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-32591", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-32591", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-87959", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202210-339", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" }, { "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In ril, there is a possible system crash due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07257259; Issue ID: ALPS07257259. Google of Android There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world", "sources": [ { "db": "NVD", "id": "CVE-2022-32591" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "CNVD", "id": "CNVD-2022-87959" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-32591", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018867", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-87959", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202210-339", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" }, { "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "id": "VAR-202210-0376", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" } ] }, "last_update_date": "2023-12-18T13:36:42.300000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Various MediaTek chip ril denial of service vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/372251" }, { "title": "MediaTek Fixes for chip security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209978" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://corp.mediatek.com/product-security-bulletin/october-2022" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32591" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-32591/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" }, { "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-87959" }, { "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "db": "NVD", "id": "CVE-2022-32591" }, { "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87959" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "date": "2022-10-07T20:15:14.823000", "db": "NVD", "id": "CVE-2022-32591" }, { "date": "2022-10-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87959" }, { "date": "2023-10-23T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-018867" }, { "date": "2022-10-12T13:52:41.910000", "db": "NVD", "id": "CVE-2022-32591" }, { "date": "2022-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-339" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-339" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Google\u00a0 of \u00a0Android\u00a0 Input verification vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-339" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.