Page 3 of 27 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

TencentOS-tiny version 3.1.0 is vulnerable to integer wrap-around in function 'tos_mmheap_alloc incorrect calculation of effective memory allocation size. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution. TencentOS-tinyv versión 3.1.0, es vulnerable a una envoltura de enteros en el cálculo incorrecto de la función "tos_mmheap_alloc del tamaño efectivo de asignación de memoria. Esta asignación de memoria incorrecta puede conllevar a una asignación de memoria arbitraria, resultando en un comportamiento no esperado como un bloqueo o una inyección/ejecución de código remota • https://www.cisa.gov/uscert/ics/advisories/icsa-21-119-04 • CWE-190: Integer Overflow or Wraparound •

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 1

Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine. Tencent GameLoop versiones anteriores a 4.1.21.90, descargaba actualizaciones mediante una conexión HTTP no segura. Un atacante malicioso en posición de MITM podría falsificar el contenido de un documento XML describiendo un paquete de actualización, reemplazando una URL de descarga por otra apuntando a un ejecutable arbitrario de Windows. • https://github.com/mmiszczyk/cve-2021-33879 https://www.gameloop.com • CWE-494: Download of Code Without Integrity Check •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-21-217 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-21-084 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

The Shenzhen Tencent app 5.8.2.5300 for PC platforms (from Tencent App Center) has a DLL hijacking vulnerability. Attackers can use this vulnerability to execute malicious code. La aplicación Shenzhen Tencent versión 5.8.2.5300 para plataformas de PC (de Tencent App Center) presenta una vulnerabilidad de secuestro de DLL. Los atacantes pueden usar esta vulnerabilidad para ejecutar código malicioso • https://www.cnvd.org.cn/flaw/show/2105399 • CWE-427: Uncontrolled Search Path Element •