Total
650 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-32057 | 2024-11-21 | 7.8 High | ||
A vulnerability has been identified in Simcenter Femap (All versions < V2406). The affected application contains a type confusion vulnerability while parsing IGS files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21562) | ||||
CVE-2024-31071 | 1 Openatom | 1 Openharmony | 2024-11-21 | 3.3 Low |
in OpenHarmony v4.0.0 and prior versions allow a local attacker cause apps crash through type confusion. | ||||
CVE-2024-30357 | 2024-11-21 | N/A | ||
Foxit PDF Reader AcroForm Annotation Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects in AcroForms. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22818. | ||||
CVE-2024-30266 | 2024-11-21 | 3.3 Low | ||
wasmtime is a runtime for WebAssembly. The 19.0.0 release of Wasmtime contains a regression introduced during its development which can lead to a guest WebAssembly module causing a panic in the host runtime. A valid WebAssembly module, when executed at runtime, may cause this panic. This vulnerability has been patched in version 19.0.1. | ||||
CVE-2024-25575 | 2024-11-21 | 8.8 High | ||
A type confusion vulnerability vulnerability exists in the way Foxit Reader 2024.1.0.23997 handles a Lock object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled. | ||||
CVE-2024-20078 | 2024-11-21 | 9.8 Critical | ||
In venc, there is a possible out of bounds write due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08737250; Issue ID: MSV-1452. | ||||
CVE-2024-20012 | 2 Google, Mediatek | 51 Android, Mt6580, Mt6731 and 48 more | 2024-11-21 | 6.7 Medium |
In keyInstall, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08358566; Issue ID: ALPS08358566. | ||||
CVE-2024-1848 | 2024-11-21 | 7.8 High | ||
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in SOLIDWORKS Desktop on Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, DWG, DXF, IPT, JT, SAT, SLDDRW, SLDPRT, STL, STP, X_B or X_T file. | ||||
CVE-2024-1847 | 2024-11-21 | 7.8 High | ||
Heap-based Buffer Overflow, Memory Corruption, Out-Of-Bounds Read, Out-Of-Bounds Write, Stack-based Buffer Overflow, Type Confusion, Uninitialized Variable, Use-After-Free vulnerabilities exist in the file reading procedure in eDrawings from Release SOLIDWORKS 2023 through Release SOLIDWORKS 2024. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted CATPART, IPT, JT, SAT, STL, STP, X_B or X_T file. NOTE: CVE-2024-3298 and CVE-2024-3299 were SPLIT from this ID. | ||||
CVE-2023-6939 | 1 Hihonor | 1 Magic Ui | 2024-11-21 | 4 Medium |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause denial of service. | ||||
CVE-2023-6045 | 1 Openatom | 1 Openharmony | 2024-11-21 | 5.9 Medium |
in OpenHarmony v3.2.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through type confusion. | ||||
CVE-2023-51560 | 2024-11-21 | N/A | ||
Foxit PDF Reader Annotation Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22259. | ||||
CVE-2023-51428 | 1 Hihonor | 1 Magic Os | 2024-11-21 | 4.6 Medium |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak. | ||||
CVE-2023-51427 | 1 Hihonor | 1 Magic Os | 2024-11-21 | 4.6 Medium |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak. | ||||
CVE-2023-51426 | 1 Hihonor | 1 Magic Os | 2024-11-21 | 4.6 Medium |
Some Honor products are affected by type confusion vulnerability, successful exploitation could cause information leak. | ||||
CVE-2023-50433 | 2024-11-21 | 6.5 Medium | ||
marshall in dhcp_packet.c in simple-dhcp-server through ec976d2 allows remote attackers to cause a denial of service by sending a malicious DHCP packet. The crash is caused by a type confusion bug that results in a large memory allocation; when this memory allocation fails the DHCP server will crash. | ||||
CVE-2023-48694 | 1 Microsoft | 1 Azure Rtos Usbx | 2024-11-21 | 6.8 Medium |
Azure RTOS USBX is a USB host, device, and on-the-go (OTG) embedded stack, that is fully integrated with Azure RTOS ThreadX. An attacker can cause remote code execution due to expired pointer dereference and type confusion vulnerabilities in Azure RTOS USBX. The affected components include functions/processes in host stack and host class, related to device linked classes, ASIX, Prolific, SWAR, audio, CDC ECM in RTOS v6.2.1 and below. The fixes have been included in USBX release 6.3.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | ||||
CVE-2023-46705 | 1 Openatom | 1 Openharmony | 2024-11-21 | 6.2 Medium |
in OpenHarmony v3.2.2 and prior versions allow a local attacker causes system information leak through type confusion. | ||||
CVE-2023-44108 | 1 Huawei | 2 Emui, Harmonyos | 2024-11-21 | 7.5 High |
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. | ||||
CVE-2023-44094 | 1 Huawei | 2 Emui, Harmonyos | 2024-11-21 | 5.3 Medium |
Type confusion vulnerability in the distributed file module.Successful exploitation of this vulnerability may cause the device to restart. |