Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-49529 | In versions of Helix Core prior to 2024.1 Patch 2 (2024.1/2655224) a Windows ANSI API Unicode "best fit" argument injection was identified. |
| Link | Providers |
|---|---|
| https://portal.perforce.com/s/detail/a91PA000001SXEzYAO |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 11 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Perforce
Perforce helix Core |
|
| CPEs | cpe:2.3:a:perforce:helix_core:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Helix
Helix helix Core |
Perforce
Perforce helix Core |
Tue, 24 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Helix
Helix helix Core |
|
| CPEs | cpe:2.3:a:helix:helix_core:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Helix
Helix helix Core |
|
| Metrics |
cvssV3_1
|
Tue, 24 Sep 2024 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In versions of Helix Core prior to 2024.1 Patch 2 (2024.1/2655224) a Windows ANSI API Unicode "best fit" argument injection was identified. | |
| Title | Unicode "best fit" argument injection | |
| Weaknesses | CWE-176 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Perforce
Published:
Updated: 2024-11-21T16:57:56.056Z
Reserved: 2024-08-21T23:12:22.823Z
Link: CVE-2024-8067
Updated: 2024-09-24T18:36:26.949Z
Status : Deferred
Published: 2024-09-25T01:15:45.673
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-8067
No data.
OpenCVE Enrichment
No data.
EUVD