📦 Tface
by Tencent
🔍 What is Tface?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Tencent TFace's restore_checkpoint function allows remote attackers to execute arbitrary code as root when users interact with malicious content. The flaw stems from improper des...
This vulnerability in Tencent TFace allows remote attackers to execute arbitrary code with root privileges by exploiting insecure deserialization in the eval endpoint. Attackers can trigger this by tr...