Show filters
187 Total Results
Displaying 21-30 of 187
Sort by:
Attacker Value
Unknown

CVE-2022-0746

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.
Attacker Value
Unknown

CVE-2022-21656

Disclosure Date: February 22, 2022 (last updated February 23, 2025)
Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.
Attacker Value
Unknown

CVE-2022-0688

Disclosure Date: February 20, 2022 (last updated February 23, 2025)
Business Logic Errors in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2022-0689

Disclosure Date: February 19, 2022 (last updated February 23, 2025)
Use multiple time the one-time coupon in Packagist microweber/microweber prior to 1.2.11.
Attacker Value
Unknown

CVE-2021-46463

Disclosure Date: February 14, 2022 (last updated February 23, 2025)
njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then().
Attacker Value
Unknown

CVE-2022-0102

Disclosure Date: February 12, 2022 (last updated February 23, 2025)
Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2021-46152

Disclosure Date: February 09, 2022 (last updated February 23, 2025)
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains a type confusion vulnerability while parsing NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14643, ZDI-CAN-14644, ZDI-CAN-14755, ZDI-CAN-15183)
Attacker Value
Unknown

CVE-2022-0524

Disclosure Date: February 08, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository publify/publify prior to 9.2.7.
Attacker Value
Unknown

CVE-2022-23583

Disclosure Date: February 04, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that any binary op would trigger `CHECK` failures. This occurs when the protobuf part corresponding to the tensor arguments is modified such that the `dtype` no longer matches the `dtype` expected by the op. In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. In most cases, this would be a silent failure, but we have noticed scenarios where this results in a `CHECK` crash, hence a denial of service. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
Attacker Value
Unknown

CVE-2022-21734

Disclosure Date: February 03, 2022 (last updated February 23, 2025)
Tensorflow is an Open Source Machine Learning Framework. The implementation of `MapStage` is vulnerable a `CHECK`-fail if the key tensor is not a scalar. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.