CVE-2024-31333
https://notcve.org/view.php?id=CVE-2024-31333
In _MMU_AllocLevel of mmu_common.c, there is a possible arbitrary code execution due to an integer overflow. • https://source.android.com/security/bulletin/2024-08-01 • CWE-190: Integer Overflow or Wraparound •
CVE-2024-43373 – webcrack has an Arbitrary File Write Vulnerability on Windows when Parsing and Saving a Malicious Bundle
https://notcve.org/view.php?id=CVE-2024-43373
This vulnerability allows an attacker to write arbitrary `.js` files to the host system, which can be leveraged to hijack legitimate Node.js modules to gain arbitrary code execution. • https://github.com/j4k0xb/webcrack/blob/241f9469e6401f3dabc6373233d85a5e76966b54/packages/webcrack/src/unpack/bundle.ts#L79 https://github.com/j4k0xb/webcrack/commit/4bc5c6f353012ee7edc2cb39d01a728ab7426999 https://github.com/j4k0xb/webcrack/security/advisories/GHSA-ccqh-278p-xq6w • CWE-20: Improper Input Validation CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-7263 – Arbitrary Code Execution in WPS Office
https://notcve.org/view.php?id=CVE-2024-7263
Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.13489 on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.2.0.16909 to mitigate CVE-2024-7262 was not restrictive enough. Another hyperlink parameter was not properly sanitized which leads to the execution of an arbitrary Windows library. Improper path validation in promecefpluginhost.exe in Kingsoft WPS Office version ranging from 12.2.0.13110 to 12.2.0.17115 (exclusive) on Windows allows an attacker to load an arbitrary Windows library. The patch released in version 12.1.0.17119 to mitigate CVE-2024-7262 was not restrictive enough. Another parameter was not properly sanitized which leads to the execution of an arbitrary Windows library. • https://www.wps.com/whatsnew/pc/20240422 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2024-23168
https://notcve.org/view.php?id=CVE-2024-23168
Vulnerability in Xiexe XSOverlay before build 647 allows non-local websites to send the malicious commands to the WebSocket API, resulting in the arbitrary code execution. • https://github.com/Xiexe/XSOverlay-Issue-Tracker https://vuln.ryotak.net/advisories/70 https://store.steampowered.com/news/app/1173510?emclan=103582791465938574&emgid=7792991106417394332 • CWE-1385: Missing Origin Validation in WebSockets •
CVE-2024-39420 – Acrobat Reader | Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
https://notcve.org/view.php?id=CVE-2024-39420
Acrobat Reader versions 20.005.30636, 24.002.21005, 24.001.30159, 20.005.30655, 24.002.20965, 24.002.20964, 24.001.30123, 24.003.20054 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could lead to arbitrary code execution. • https://helpx.adobe.com/security/products/acrobat/apsb24-70.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •