Show filters
80 Total Results
Displaying 11-20 of 80
Sort by:
Attacker Value
Unknown
CVE-2020-26990
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0.1), Teamcenter Visualization (All versions < V13.1.0.1). Affected applications lack proper validation of user-supplied data when parsing ASM files. A crafted ASM file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11897)
0
Attacker Value
Unknown
CVE-2020-26980
Disclosure Date: January 12, 2021 (last updated February 22, 2025)
A vulnerability has been identified in JT2Go (All versions < V13.1.0), Teamcenter Visualization (All versions < V13.1.0). Affected applications lack proper validation of user-supplied data when parsing JT files. A crafted JT file could trigger a type confusion condition. An attacker could leverage this vulnerability to execute code in the context of the current process. (ZDI-CAN-11881)
0
Attacker Value
Unknown
CVE-2020-27293
Disclosure Date: January 11, 2021 (last updated February 22, 2025)
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing project files, which may allow an attacker to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2020-16015
Disclosure Date: January 08, 2021 (last updated February 22, 2025)
Insufficient data validation in WASM in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
0
Attacker Value
Unknown
CVE-2020-6656
Disclosure Date: January 07, 2021 (last updated February 22, 2025)
Eaton's easySoft software v7.xx prior to v7.22 are susceptible to file parsing type confusion remote code execution vulnerability. A malicious entity can execute a malicious code or make the application crash by tricking user upload a malformed .E70 file in the application. The vulnerability arises due to improper validation of user data supplied through E70 file which is causing Type Confusion.
0
Attacker Value
Unknown
CVE-2020-27257
Disclosure Date: January 07, 2021 (last updated February 22, 2025)
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.
0
Attacker Value
Unknown
CVE-2019-25010
Disclosure Date: December 31, 2020 (last updated February 22, 2025)
An issue was discovered in the failure crate through 2019-11-13 for Rust. Type confusion can occur when __private_get_type_id__ is overridden.
0
Attacker Value
Unknown
CVE-2020-13547
Disclosure Date: December 22, 2020 (last updated February 22, 2025)
A type confusion vulnerability exists in the JavaScript engine of Foxit Software’s Foxit PDF Reader, version 10.1.0.37527. A specially crafted PDF document can trigger an improper use of an object, resulting in memory corruption and arbitrary code execution. An attacker needs to trick the user to open the malicious file to trigger this vulnerability. If the browser plugin extension is enabled, visiting a malicious site can also trigger the vulnerability.
0
Attacker Value
Unknown
CVE-2020-16103
Disclosure Date: December 14, 2020 (last updated February 22, 2025)
Type confusion in Gallagher Command Centre Server allows a remote attacker to crash the server or possibly cause remote code execution. This issue affects: Gallagher Command Centre 8.30 versions prior to 8.30.1236(MR1); 8.20 versions prior to 8.20.1166(MR3); 8.10 versions prior to 8.10.1211(MR5); version 8.00 and prior versions.
0
Attacker Value
Unknown
CVE-2020-25661
Disclosure Date: November 05, 2020 (last updated February 22, 2025)
A Red Hat only CVE-2020-12351 regression issue was found in the way the Linux kernel's Bluetooth implementation handled L2CAP packets with A2MP CID. This flaw allows a remote attacker in an adjacent range to crash the system, causing a denial of service or potentially executing arbitrary code on the system by sending a specially crafted L2CAP packet. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
0