cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-20072,https://securityvulnerability.io/vulnerability/CVE-2024-20072,Possible Out of Bounds Write in WLAN Driver Could Lead to Local Escalation of Privilege,"A significant vulnerability has been identified in the MediaTek WLAN driver, characterized by improper input validation that allows for an out of bounds write. This flaw enables attackers to escalate privileges locally, granting them system execution rights without requiring user interaction. This type of security risk underscores the importance of deploying timely updates and patches, such as WCNCR00364732, to safeguard systems against potential exploitation.",MediaTek,"Mt6890, Mt6990, Mt7622",,,0.0004299999854993075,false,false,false,false,,false,false,2024-06-03T02:04:53.505Z,0 CVE-2024-20071,https://securityvulnerability.io/vulnerability/CVE-2024-20071,Possible Out of Bounds Read Vulnerability in WLAN Driver Could Lead to Local Information Disclosure,"In the WLAN driver developed by MediaTek, a vulnerability exists that allows for an out-of-bounds read due to improper input validation. This condition can result in local information disclosure. The exploitation of this vulnerability does not require user interaction, making it particularly concerning for systems relying on the WLAN driver. Users with system execution privileges may be affected. Mitigation efforts include applying patches identified by Patch ID: WCNCR00364733, addressing Issue ID: MSV-1331 as outlined in MediaTek's product security bulletin.",MediaTek,"Mt6890, Mt6990, Mt7622",,,0.0004299999854993075,false,false,false,false,,false,false,2024-06-03T02:04:51.932Z,0