
CVE-2024-34139 – Adobe Bridge has an integer overflow vulnerability when parsing SVG file
https://notcve.org/view.php?id=CVE-2024-34139
09 Jul 2024 — Bridge versions 14.0.4, 13.0.7, 14.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. ... Las versiones de Bridge 14.0.4, 13.0.7, 14.1 y anteriores se ven afectadas por una vulnerabilidad de desbordamiento de enteros o Wraparound que podría resultar en la ejecución de código arbitrario en el contexto del usuario actual. • https://helpx.adobe.com/security/products/bridge/apsb24-51.html • CWE-190: Integer Overflow or Wraparound •

CVE-2024-39684 – Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Overflow
https://notcve.org/view.php?id=CVE-2024-39684
09 Jul 2024 — Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-38517 – Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow
https://notcve.org/view.php?id=CVE-2024-38517
09 Jul 2024 — Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. ... It was discovered that RapidJSON incorrectly parsed numbers written in scientific notatio... • https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-38074 – Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38074
09 Jul 2024 — Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38074 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-38050 – Windows Workstation Service Elevation of Privilege Vulnerability
https://notcve.org/view.php?id=CVE-2024-38050
09 Jul 2024 — Windows Workstation Service Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Windows Workstation Service • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38050 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-38019 – Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-38019
09 Jul 2024 — Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de la lihbrería Microsoft Windows Performance Data Helper • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38019 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-37975 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-37975
09 Jul 2024 — Secure Boot Security Feature Bypass Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVE-2024-37336 – SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-37336
09 Jul 2024 — SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37336 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-37323 – SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2024-37323
09 Jul 2024 — SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37323 • CWE-190: Integer Overflow or Wraparound •

CVE-2024-26184 – Secure Boot Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2024-26184
09 Jul 2024 — Secure Boot Security Feature Bypass Vulnerability Vulnerabilidad de omisión de la función de seguridad de arranque seguro • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184 • CWE-190: Integer Overflow or Wraparound •