Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-39684

Опубликовано: 09 июл. 2024
Источник: nvd
CVSS3: 7.8
EPSS Низкий

Описание

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the GenericReader::ParseNumber() function of include/rapidjson/reader.h when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3

Дефекты

CWE-190

Связанные уязвимости

CVSS3: 7.8
ubuntu
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
redhat
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.

CVSS3: 7.8
msrc
12 месяцев назад

Github: CVE-2024-39684 TenCent RapidJSON Elevation of Privilege Vulnerability

CVSS3: 7.8
debian
12 месяцев назад

Tencent RapidJSON is vulnerable to privilege escalation due to an inte ...

CVSS3: 7.8
fstec
12 месяцев назад

Уязвимость функции GenericReader::ParseNumber() библиотеки для обработки JSON-файлов RapidJSON операционных систем Windows, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 16%
0.00051
Низкий

7.8 High

CVSS3

Дефекты

CWE-190