tencent CVE Vulnerabilities & Metrics

Focus on tencent vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About tencent Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with tencent. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total tencent CVEs: 20
Earliest CVE date: 25 Jan 2012, 04:03 UTC
Latest CVE date: 31 Dec 2023, 07:15 UTC

Latest CVE reference: CVE-2023-52286

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical tencent CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.89

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 8
4.0-6.9 14
7.0-8.9 2
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS tencent CVEs

These are the five CVEs with the highest CVSS scores for tencent, sorted by severity first and recency.

All CVEs for tencent

CVE-2023-52286 tencent vulnerability CVSS: 0 31 Dec 2023, 07:15 UTC

Tencent tdsqlpcloud through 1.8.5 allows unauthenticated remote attackers to discover database credentials via an index.php/api/install/get_db_info request, a related issue to CVE-2023-42387.

CVE-2023-40829 tencent vulnerability CVSS: 0 12 Oct 2023, 05:15 UTC

There is an interface unauthorized access vulnerability in the background of Tencent Enterprise Wechat Privatization 2.5.x and 2.6.930000.

CVE-2023-39988 tencent vulnerability CVSS: 0 04 Sep 2023, 11:15 UTC

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in 标准云(std.Cloud) WxSync plugin <= 2.7.23 versions.

CVE-2023-34312 tencent vulnerability CVSS: 0 01 Jun 2023, 03:15 UTC

In Tencent QQ through 9.7.8.29039 and TIM through 3.4.7.22084, QQProtect.exe and QQProtectEngine.dll do not validate pointers from inter-process communication, which leads to a write-what-where condition.

CVE-2023-30363 tencent vulnerability CVSS: 0 26 Apr 2023, 21:15 UTC

vConsole v3.15.0 was discovered to contain a prototype pollution due to incorrect key and value resolution in setOptions in core.ts.

CVE-2022-35158 tencent vulnerability CVSS: 0 03 Aug 2022, 21:15 UTC

A vulnerability in the lua parser of TscanCode tsclua v2.15.01 allows attackers to cause a Denial of Service (DoS) via a crafted lua script.

CVE-2021-40180 tencent vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

In the WeChat application 8.0.10 for Android and iOS, a mini program can obtain sensitive information from a user's address book via wx.searchContacts.

CVE-2021-33057 tencent vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The QQ application 8.7.1 for Android and iOS does not enforce the permission requirements (e.g., android.permission.ACCESS_FINE_LOCATION) for determining the device's physical location. An attacker can use qq.createMapContext to create a MapContext object, use MapContext.moveToLocation to move the center of the map to the device's location, and use MapContext.getCenterLocation to get the latitude and longitude of the current map center.

CVE-2021-27439 tencent vulnerability CVSS: 7.5 03 May 2022, 21:15 UTC

TencentOS-tiny version 3.1.0 is vulnerable to integer wrap-around in function 'tos_mmheap_alloc incorrect calculation of effective memory allocation size. This improper memory assignment can lead to arbitrary memory allocation, resulting in unexpected behavior such as a crash or a remote code injection/execution.

CVE-2021-33879 tencent vulnerability CVSS: 6.8 06 Jun 2021, 20:15 UTC

Tencent GameLoop before 4.1.21.90 downloaded updates over an insecure HTTP connection. A malicious attacker in an MITM position could spoof the contents of an XML document describing an update package, replacing a download URL with one pointing to an arbitrary Windows executable. Because the only integrity check would be a comparison of the downloaded file's MD5 checksum to the one contained within the XML document, the downloaded executable would then be executed on the victim's machine.

CVE-2021-27247 tencent vulnerability CVSS: 4.3 14 Apr 2021, 16:15 UTC

This vulnerability allows remote attackers to disclose sensitive information on affected installations of Tencent WeChat 2.9.5 desktop version. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-11907.

CVE-2020-27874 tencent vulnerability CVSS: 6.8 10 Feb 2021, 23:15 UTC

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat 7.0.18. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-11580.

CVE-2020-24162 tencent vulnerability CVSS: 4.4 03 Sep 2020, 17:15 UTC

The Shenzhen Tencent app 5.8.2.5300 for PC platforms (from Tencent App Center) has a DLL hijacking vulnerability. Attackers can use this vulnerability to execute malicious code.

CVE-2020-24160 tencent vulnerability CVSS: 4.4 03 Sep 2020, 17:15 UTC

Shenzhen Tencent TIM Windows client 3.0.0.21315 has a DLL hijacking vulnerability, which can be exploited by attackers to execute malicious code.

CVE-2020-10551 tencent vulnerability CVSS: 7.2 09 Apr 2020, 13:15 UTC

QQBrowser before 10.5.3870.400 installs a Windows service TsService.exe. This file is writable by anyone belonging to the NT AUTHORITY\Authenticated Users group, which includes all local and remote users. This can be abused by local attackers to escalate privileges to NT AUTHORITY\SYSTEM by writing a malicious executable to the location of TsService.

CVE-2019-17151 tencent vulnerability CVSS: 5.8 07 Jan 2020, 23:15 UTC

This vulnerability allows remote attackers redirect users to an external resource on affected installations of Tencent WeChat Prior to 7.0.9. User interaction is required to exploit this vulnerability in that the target must be within a chat session together with the attacker. The specific flaw exists within the parsing of a users profile. The issue lies in the failure to properly validate a users name. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-9302.

CVE-2019-13125 tencent vulnerability CVSS: 6.8 01 Jul 2019, 14:15 UTC

HaboMalHunter through 2.0.0.3 in Tencent Habo allows attackers to evade dynamic malware analysis via PIE compilation.

CVE-2019-11419 tencent vulnerability CVSS: 4.3 14 May 2019, 19:29 UTC

vcodec2_hls_filter in libvoipCodec_v7a.so in the WeChat application through 7.0.3 for Android allows attackers to cause a denial of service (application crash) by replacing an emoji file (under the /sdcard/tencent/MicroMsg directory) with a crafted .wxgf file. The content of the replacement must be derived from the phone's IMEI. The crash occurs upon receiving a message that contains the replaced emoji.

CVE-2018-11616 tencent vulnerability CVSS: 6.8 30 Aug 2018, 12:29 UTC

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Tencent Foxmail 7.2.9.115. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI handlers. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-5543.

CVE-2018-13439 tencent vulnerability CVSS: 5.0 08 Jul 2018, 15:29 UTC

WXPayUtil in WeChat Pay Java SDK allows XXE attacks involving a merchant notification URL.

CVE-2011-4867 tencent vulnerability CVSS: 5.8 25 Jan 2012, 04:03 UTC

The Tencent QQPhoto (com.tencent.qqphoto) application 0.97 for Android does not properly protect data, which allows remote attackers to read or modify contact information and a password hash via a crafted application.

CVE-2011-4865 tencent vulnerability CVSS: 5.8 25 Jan 2012, 04:03 UTC

The Tencent WBlog (com.tencent.WBlog) 3.3.1 and MicroBlogPad 1.4.0 applications for Android do not properly protect data, which allows remote attackers to read or modify message drafts and search keywords via a crafted application.

CVE-2011-4864 tencent vulnerability CVSS: 5.8 25 Jan 2012, 04:03 UTC

The Tencent MobileQQ (com.tencent.mobileqq) application 2.2 for Android does not properly protect data, which allows remote attackers to read or modify messages and a friends list via a crafted application.

CVE-2011-4863 tencent vulnerability CVSS: 5.8 25 Jan 2012, 04:03 UTC

The Tencent QQPimSecure (com.tencent.qqpimsecure) application 3.0.2 for Android does not properly protect data, which allows remote attackers to read or modify SMS/MMS messages and a contact list via a crafted application.