{"id":"CVE-2024-39684","summary":"Tencent RapidJSON include/rapidjson/reader.h GenericReader::ParseNumber() Function Template Exponent Parsing Integer Overflow","details":"Tencent RapidJSON is vulnerable to privilege escalation due to an integer overflow in the `GenericReader::ParseNumber()` function of `include/rapidjson/reader.h` when parsing JSON text from a stream. An attacker needs to send the victim a crafted file which needs to be opened; this triggers the integer overflow vulnerability (when the file is parsed), leading to elevation of privilege.","modified":"2026-04-10T05:14:35.235176Z","published":"2024-07-09T18:53:53Z","references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240905-0003/"},{"type":"WEB","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-39684"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39684.json","unresolved_versions":[{"type":"","events":[{"introduced":"0"},{"last_affected":"1.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"}]}