cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-20033,https://securityvulnerability.io/vulnerability/CVE-2024-20033,Possible Information Disclosure in NVRAM Due to Missing Bounds Check,"In nvram, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08499945; Issue ID: ALPS08499945.",MediaTek,"Mt2713, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6789, Mt6835, Mt6855, Mt6879, Mt6883, Mt6885, Mt6886, Mt6893, Mt6895, Mt6983, Mt6985, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8370, Mt8385, Mt8390, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8676, Mt8678, Mt8755, Mt8765, Mt8766, Mt8768, Mt8775, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8792, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,false,false,false,,false,false,2024-03-04T02:43:48.493Z,0 CVE-2024-20025,https://securityvulnerability.io/vulnerability/CVE-2024-20025,,"In da, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08541686; Issue ID: ALPS08541686.",MediaTek,"Mt6739, Mt6757, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6873, Mt6877, Mt6885, Mt6893, Mt8167, Mt8168, Mt8173, Mt8175, Mt8185, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8673, Mt8678, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8796, Mt8797, Mt8798",,,0.0004299999854993075,false,false,false,false,,false,false,2024-03-04T02:43:35.600Z,0 CVE-2023-32884,https://securityvulnerability.io/vulnerability/CVE-2023-32884,Information Disclosure Vulnerability in MediaTek NetDagent,"A vulnerability exists in MediaTek's NetDagent due to improper bounds checking, leading to possible information disclosure. This issue may allow an attacker to escalate privileges locally with System execution rights. Exploitation of this vulnerability does not require user interaction, thus posing a significant threat to system integrity and user data. Affected versions have been patched under Patch ID ALPS07944011 to address this security concern.",MediaTek,"MT2713, MT6580, MT6739, MT6761, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8192, MT8195, MT8195Z, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8696, MT8755, MT8765, MT8766, MT8768, MT8771, MT8775, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-02T03:15:00.000Z,0 CVE-2023-32883,https://securityvulnerability.io/vulnerability/CVE-2023-32883,Out of Bounds Write Vulnerability in MediaTek Engineer Mode,"In MediaTek's Engineer Mode, an out of bounds write vulnerability has been identified due to a missing bounds check. This flaw allows for local escalation of privileges, potentially granting malicious entities access to system execution privileges. Importantly, this vulnerability does not require user interaction for exploitation, making it a significant security concern. MediaTek has released a patch identified as ALPS08282249 to address this issue. It is crucial for users of affected MediaTek products to apply the latest updates to mitigate potential risks associated with this vulnerability.",MediaTek,"MT2713, MT6580, MT6739, MT6761, MT6762, MT6765, MT6768, MT6769, MT6779, MT6781, MT6785, MT6789, MT6833, MT6835, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6886, MT6889, MT6891, MT6893, MT6895, MT6983, MT6985, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8188, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8667, MT8673, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791T, MT8797, MT8798",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2024-01-02T03:15:00.000Z,0 CVE-2023-20790,https://securityvulnerability.io/vulnerability/CVE-2023-20790,,"In nvram, there is a possible out of bounds write due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07740194; Issue ID: ALPS07740194.",MediaTek,"Mt2713, Mt2735, Mt2737, Mt6739, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6835, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6880, Mt6883, Mt6885, Mt6886, Mt6889, Mt6890, Mt6891, Mt6893, Mt6895, Mt6980, Mt6983, Mt6985, Mt6990, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8188, Mt8195, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8395, Mt8666, Mt8667, Mt8673, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",4.4,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-08-07T04:15:00.000Z,0 CVE-2023-20693,https://securityvulnerability.io/vulnerability/CVE-2023-20693,Remote Denial of Service Vulnerability in MediaTek WLAN Firmware,"A vulnerability exists in MediaTek's WLAN firmware that may cause a system crash due to an uncaught exception, leading to a potential remote denial of service. This issue can be exploited without requiring any user interaction, making it a significant concern for affected users. Affected systems might experience downtime or instability, impacting network operations significantly. Users are advised to apply the available patches to mitigate this vulnerability.",MediaTek,"Mt6739, Mt6895, Mt6983, Mt8167, Mt8168, Mt8195, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8781, Mt8788",7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-07-04T02:15:00.000Z,0 CVE-2023-20690,https://securityvulnerability.io/vulnerability/CVE-2023-20690,Integer Overflow Vulnerability in MediaTek WLAN Firmware,"A vulnerability has been identified in the WLAN firmware provided by MediaTek, which occurs due to an integer overflow. This flaw may allow an attacker to exploit the system remotely, resulting in a denial of service without requiring any user interaction or special execution privileges. Affected users should update to the patched version identified by Patch ID ALPS07664735 to mitigate the risk.",MediaTek,"Mt6739, Mt8167, Mt8168, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8788",7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-07-04T02:15:00.000Z,0 CVE-2023-20766,https://securityvulnerability.io/vulnerability/CVE-2023-20766,,"In gps, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573237; Issue ID: ALPS07573202.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6753, Mt6757, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6886, Mt6891, Mt6893, Mt6895, Mt6983, Mt6985, Mt8167, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-07-04T02:15:00.000Z,0 CVE-2023-20692,https://securityvulnerability.io/vulnerability/CVE-2023-20692,Denial of Service Vulnerability in Mediatek WLAN Firmware,"A vulnerability exists in Mediatek's WLAN firmware that may cause a system crash due to an uncaught exception. This flaw allows for a potential remote denial of service attack without requiring additional execution privileges or user interaction, thus posing a significant risk to devices using the affected firmware. Timely patching is advised to mitigate this risk.",MediaTek,"Mt6739, Mt8167, Mt8168, Mt8321, Mt8365, Mt8385, Mt8666, Mt8765, Mt8788",7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2023-07-04T02:15:00.000Z,0 CVE-2023-20726,https://securityvulnerability.io/vulnerability/CVE-2023-20726,,"In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only).",MediaTek,"MT2731, MT2735, MT2737, MT6580, MT6739, MT6761, MT6762, MT6765, MT6767, MT6768, MT6769, MT6771, MT6779, MT6781, MT6783, MT6785, MT6789, MT6833, MT6853, MT6855, MT6873, MT6877, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6980, MT6980D, MT6983, MT6985, MT6990, MT8167, MT8168, MT8173, MT8185, MT8321, MT8362A, MT8365, MT8385, MT8666, MT8673, MT8675, MT8765, MT8766, MT8768, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8797",3.3,LOW,0.0004199999966658652,false,false,false,false,,false,false,2023-05-15T00:00:00.000Z,0 CVE-2023-20688,https://securityvulnerability.io/vulnerability/CVE-2023-20688,,"In power, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441821; Issue ID: ALPS07441821.",MediaTek,"MT2715, MT6580, MT6731, MT6735, MT6737, MT6739, MT6753, MT6757, MT6757C, MT6757CD, MT6757CH, MT6761, MT6762, MT6763, MT6765, MT6768, MT6769, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT8167, MT8168, MT8169, MT8173, MT8175, MT8183, MT8185, MT8188, MT8192, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8390, MT8395, MT8666, MT8673, MT8675, MT8696, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8891",4.4,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-04-06T00:00:00.000Z,0 CVE-2023-20655,https://securityvulnerability.io/vulnerability/CVE-2023-20655,Privilege Escalation Vulnerability in MediaTek mmsdk Product,"A vulnerability exists in the MediaTek mmsdk due to a parcel format mismatch, which might allow local code execution without requiring additional execution privileges or user interaction. This flaw can be exploited by attackers to gain unauthorized access to system resources, posing a significant security risk. Users of affected versions are advised to apply the recommended patches promptly to safeguard their systems.",MediaTek,"MT2715, MT6580, MT6735, MT6737, MT6739, MT6753, MT6761, MT6765, MT6768, MT6771, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6853T, MT6855, MT6873, MT6877, MT6879, MT6883, MT6885, MT6889, MT6893, MT6895, MT6983, MT8167, MT8167S, MT8168, MT8173, MT8175, MT8185, MT8192, MT8195, MT8321, MT8362A, MT8365, MT8385, MT8395, MT8666, MT8667, MT8673, MT8675, MT8765, MT8766, MT8768, MT8771, MT8781, MT8786, MT8788, MT8789, MT8791, MT8791T, MT8795T, MT8797, MT8798, MT8871, MT8891",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-04-06T00:00:00.000Z,0 CVE-2022-32635,https://securityvulnerability.io/vulnerability/CVE-2022-32635,Out of Bounds Write Vulnerability in MediaTek GPS Services,"A vulnerability exists in MediaTek's GPS services which allows for a possible out of bounds write due to a missing bounds check. This flaw could enable local escalation of privilege without the need for additional execution privileges, and does not require user interaction to exploit. Users and administrators are encouraged to apply the available patches to mitigate this issue.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6753, Mt6757, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0 CVE-2022-32641,https://securityvulnerability.io/vulnerability/CVE-2022-32641,,"In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0 CVE-2022-32640,https://securityvulnerability.io/vulnerability/CVE-2022-32640,,"In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652.",MediaTek,"Mt6580, Mt6731, Mt6735, Mt6737, Mt6739, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6853t, Mt6855, Mt6873, Mt6875, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8781, Mt8786, Mt8788, Mt8789, Mt8791, Mt8791t, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2023-01-03T00:00:00.000Z,0 CVE-2022-26469,https://securityvulnerability.io/vulnerability/CVE-2022-26469,,"In MtkEmail, there is a possible escalation of privilege due to fragment injection. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07216598; Issue ID: ALPS07216598.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-09-06T17:19:08.000Z,0 CVE-2022-26468,https://securityvulnerability.io/vulnerability/CVE-2022-26468,,"In preloader (usb), there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07168125; Issue ID: ALPS07168125.",MediaTek,"Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6855, Mt6873, Mt6877, Mt6879, Mt6885, Mt6893, Mt6895, Mt6983, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8735a, Mt8735b, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8797",6.6,MEDIUM,0.0004799999878741801,false,false,false,false,,false,false,2022-09-06T17:19:08.000Z,0 CVE-2022-21777,https://securityvulnerability.io/vulnerability/CVE-2022-21777,,"In Autoboot, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06713894; Issue ID: ALPS06713894.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6785, Mt6833, Mt6853, Mt6873, Mt6875, Mt6877, Mt6879, Mt6885, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-07-06T13:07:31.000Z,0 CVE-2022-21776,https://securityvulnerability.io/vulnerability/CVE-2022-21776,,"In MDP, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06545450; Issue ID: ALPS06545450.",MediaTek,"Mt6580, Mt6739, Mt6761, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6789, Mt6833, Mt6853, Mt6873, Mt6877, Mt6879, Mt6883, Mt6885, Mt6889, Mt6893, Mt6895, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8791, Mt8797, Mt8798",6.4,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2022-07-06T13:07:25.000Z,0 CVE-2022-21759,https://securityvulnerability.io/vulnerability/CVE-2022-21759,,"In power service, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06419106; Issue ID: ALPS06419077.",MediaTek,"Mt6580, Mt6735, Mt6739, Mt6761, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6833, Mt6853, Mt6873, Mt6875, Mt6877, Mt6879, Mt6885, Mt6891, Mt6893, Mt6895, Mt6983, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.7,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2022-06-06T17:40:26.000Z,0 CVE-2022-21743,https://securityvulnerability.io/vulnerability/CVE-2022-21743,,"In ion, there is a possible use after free due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06371108; Issue ID: ALPS06371108.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2022-05-03T20:06:47.000Z,0 CVE-2022-20111,https://securityvulnerability.io/vulnerability/CVE-2022-20111,,"In ion, there is a possible use after free due to incorrect error handling. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06366069; Issue ID: ALPS06366069.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",8.4,HIGH,0.00044999999227002263,false,false,false,false,,false,false,2022-05-03T20:06:29.000Z,0 CVE-2022-20110,https://securityvulnerability.io/vulnerability/CVE-2022-20110,,"In ion, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399901.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-05-03T19:56:43.000Z,0 CVE-2022-20109,https://securityvulnerability.io/vulnerability/CVE-2022-20109,,"In ion, there is a possible use after free due to improper update of reference count. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06399915; Issue ID: ALPS06399915.",MediaTek,"Mt6580, Mt6735, Mt6737, Mt6739, Mt6750, Mt6750s, Mt6753, Mt6757, Mt6757c, Mt6757cd, Mt6757ch, Mt6761, Mt6762, Mt6763, Mt6765, Mt6768, Mt6769, Mt6771, Mt6779, Mt6781, Mt6785, Mt6797, Mt6833, Mt6853, Mt6853t, Mt6873, Mt6875, Mt6877, Mt6883, Mt6885, Mt6889, Mt6893, Mt8167, Mt8168, Mt8173, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2022-05-03T19:56:22.000Z,0 CVE-2022-20073,https://securityvulnerability.io/vulnerability/CVE-2022-20073,,"In preloader (usb), there is a possible out of bounds write due to a integer underflow. This could lead to local escalation of privilege, for an attacker who has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS06160841; Issue ID: ALPS06160841.",MediaTek,"Mt2601, Mt6580, Mt6735, Mt6739, Mt6761, Mt6763, Mt6765, Mt6768, Mt6771, Mt6779, Mt6781, Mt6785, Mt6799, Mt6833, Mt6873, Mt6877, Mt6885, Mt6893, Mt8163, Mt8167, Mt8167s, Mt8168, Mt8173, Mt8175, Mt8183, Mt8185, Mt8321, Mt8362a, Mt8365, Mt8385, Mt8666, Mt8667, Mt8675, Mt8695, Mt8696, Mt8765, Mt8766, Mt8768, Mt8786, Mt8788, Mt8789, Mt8791, Mt8797",6.6,MEDIUM,0.0004600000102072954,false,false,false,false,,false,false,2022-04-11T19:38:05.000Z,0