CVE-2024-39684 – Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Overflow
https://notcve.org/view.php?id=CVE-2024-39684
Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege. Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento de enteros en la función `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la víctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevación de privilegios. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684 • CWE-190: Integer Overflow or Wraparound •
CVE-2024-38517 – Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Underflow
https://notcve.org/view.php?id=CVE-2024-38517
Tencent RapidJSON is vulnerable to privilege escalation due to an integer underflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer underflow vulnerability (when the file is parsed), leading to elevation of privilege. Tencent RapidJSON es vulnerable a la escalada de privilegios debido a un desbordamiento insuficiente de enteros en la función `GenericReader::ParseNumber()` de `include/rapidjson/reader.h` al analizar texto JSON de una secuencia. Un atacante debe enviar a la víctima un archivo manipulado que debe abrirse; esto desencadena la vulnerabilidad de desbordamiento de enteros (cuando se analiza el archivo), lo que lleva a la elevación de privilegios. • https://github.com/Tencent/rapidjson/pull/1261/commits/8269bc2bc289e9d343bae51cdf6d23ef0950e001 https://github.com/fmalita/rapidjson/commit/8269bc2bc289e9d343bae51cdf6d23ef0950e001 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38517 • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2023-52286
https://notcve.org/view.php?id=CVE-2023-52286
Tencent tdsqlpcloud through 1.8.5 allows unauthenticated remote attackers to discover database credentials via an index.php/api/install/get_db_info request, a related issue to CVE-2023-42387. Tencent tdsqlpcloud hasta 1.8.5 permite a atacantes remotos no autenticados descubrir credenciales de bases de datos mediante una solicitud index.php/api/install/get_db_info, un problema relacionado con CVE-2023-42387. • https://github.com/Narrator21/tdsql/blob/main/20230927.md • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2023-40829
https://notcve.org/view.php?id=CVE-2023-40829
There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000. Existe una vulnerabilidad de acceso no autorizado a la interfaz en segundo plano en Tencent Enterprise Wechat Privatization 2.5.x y 2.6.930000. • https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9 • CWE-863: Incorrect Authorization •
CVE-2023-39988 – WordPress WxSync Plugin <= 2.7.23 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2023-39988
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 标准云(std.Cloud) WxSync plugin <= 2.7.23 versions. Se ha encontrado una vulnerabilidad de Cross-Site Scripting (XSS) reflejado y autenticado (con permisos de contribuidor o superiores) en el plugin WxSync en versiones anteriores e incluyendo la 2.7.23. The WxSync plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.7.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/wxsync/wordpress-wxsync-plugin-2-7-23-cross-site-scripting-xss?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •