8 results (0.002 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

26 Jul 2024 — Insecure Permissions vulnerability in Tencent wechat v.8.0.37 allows an attacker to escalate privileges via the web-view component. • https://github.com/yikaikkk/CookieShareInWebView/blob/master/README.md • CWE-266: Incorrect Privilege Assignment •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

12 Oct 2023 — There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000. Existe una vulnerabilidad de acceso no autorizado a la interfaz en segundo plano en Tencent Enterprise Wechat Privatization 2.5.x y 2.6.930000. • https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9 • CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

26 Jul 2022 — In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts. En la aplicación WeChat versión 8.0.10 para Android e iOS, un mini programa puede obtener información confidencial de la libreta de direcciones de un usuario por medio de wx.searchContacts • https://arxiv.org/pdf/2205.15202.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

24 Feb 2021 — This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction w... • https://www.zerodayinitiative.com/advisories/ZDI-21-217 • CWE-125: Out-of-bounds Read •

CVSS: 8.8EPSS: 1%CPEs: 1EXPL: 0

22 Jan 2021 — This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code ... • https://www.zerodayinitiative.com/advisories/ZDI-21-084 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2019 — This vulnerability allows remote attackers redirect users to an external resource on affected installations of Tencent WeChat Prior to 7.0.9. User interaction is required to exploit this vulnerability in that the target must be within a chat session together with the attacker. The specific flaw exists within the parsing of a users profile. The issue lies in the failure to properly validate a users name. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of... • https://www.zerodayinitiative.com/advisories/ZDI-19-1035 • CWE-356: Product UI does not Warn User of Unsafe Actions CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVSS: 5.5EPSS: 3%CPEs: 1EXPL: 3

14 May 2019 — vcodec2_hls_filter in libvoipCodec_v7a.so in the WeChat application through 7.0.3 for Android allows attackers to cause a denial of service (application crash) by replacing an emoji file (under the /sdcard/tencent/MicroMsg directory) with a crafted .wxgf file. The content of the replacement must be derived from the phone's IMEI. The crash occurs upon receiving a message that contains the replaced emoji. vcodec2_hls_filter en libvoipCodec_v7a.so en la aplicación WeChat hasta 7.0.3 para Android permite a los ... • https://packetstorm.news/files/id/152947 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

08 Jul 2018 — WXPayUtil in WeChat Pay Java SDK allows XXE attacks involving a merchant notification URL. WXPayUtil en WeChat Pay Java SDK permite ataques XEE (XML External Entity) relacionados con una URL de notificación merchant. • https://packetstormsecurity.com/files/148390/WeChat-Pay-SDK-XXE-Injection.html • CWE-611: Improper Restriction of XML External Entity Reference •