CVE-2023-40829
https://notcve.org/view.php?id=CVE-2023-40829
There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000. Existe una vulnerabilidad de acceso no autorizado a la interfaz en segundo plano en Tencent Enterprise Wechat Privatization 2.5.x y 2.6.930000. • https://gist.github.com/wwwziziyu/85bdf8d56b415974c4827a5668f493e9 • CWE-863: Incorrect Authorization •
CVE-2021-40180
https://notcve.org/view.php?id=CVE-2021-40180
In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts. En la aplicación WeChat versión 8.0.10 para Android e iOS, un mini programa puede obtener información confidencial de la libreta de direcciones de un usuario por medio de wx.searchContacts • https://arxiv.org/pdf/2205.15202.pdf https://github.com/BESTICSP/Vulnerabilities-Related-to-Mini-Programs-Permissions/blob/main/WX%20applet%20contact%20permission%20vulnerability%20report.pdf https://pan.baidu.com/s/116sAQvs1CEzCeIfpI1NZvA https://pan.baidu.com/s/1RqMrZBruZZ4OHdnXUN5xDw • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2021-27247 – Tencent WeChat WXAM Decoder Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2021-27247
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-21-217 • CWE-125: Out-of-bounds Read •
CVE-2020-27874 – Tencent WeChat WXAM Decoder Out-Of-Bounds Access Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-27874
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-21-084 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2019-17151 – Tencent WeChat name Field Unsafe Redirection Vulnerability
https://notcve.org/view.php?id=CVE-2019-17151
This vulnerability allows remote attackers redirect users to an external resource on affected installations of Tencent WeChat Prior to 7.0.9. User interaction is required to exploit this vulnerability in that the target must be within a chat session together with the attacker. The specific flaw exists within the parsing of a users profile. The issue lies in the failure to properly validate a users name. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. • https://www.zerodayinitiative.com/advisories/ZDI-19-1035 • CWE-356: Product UI does not Warn User of Unsafe Actions CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •