Show filters
215 Total Results
Displaying 41-50 of 215
Sort by:
Attacker Value
Unknown

CVE-2022-0795

Disclosure Date: April 05, 2022 (last updated February 23, 2025)
Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Attacker Value
Unknown

CVE-2022-1176

Disclosure Date: March 31, 2022 (last updated February 23, 2025)
Loose comparison causes IDOR on multiple endpoints in GitHub repository livehelperchat/livehelperchat prior to 3.96.
Attacker Value
Unknown

CVE-2022-1155

Disclosure Date: March 30, 2022 (last updated February 23, 2025)
Old sessions are not blocked by the login enable function. in GitHub repository snipe/snipe-it prior to 5.3.10.
Attacker Value
Unknown

CVE-2021-46743

Disclosure Date: March 29, 2022 (last updated February 23, 2025)
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT library unsafely, but might not be considered a vulnerability in the library itself.
Attacker Value
Unknown

CVE-2021-26600

Disclosure Date: March 28, 2022 (last updated February 23, 2025)
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
Attacker Value
Unknown

CVE-2022-0514

Disclosure Date: March 21, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository crater-invoice/crater prior to 6.0.5.
Attacker Value
Unknown

CVE-2022-22661

Disclosure Date: March 18, 2022 (last updated February 23, 2025)
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.6.5, macOS Monterey 12.3, Security Update 2022-003 Catalina. An application may be able to execute arbitrary code with kernel privileges.
Attacker Value
Unknown

CVE-2021-40061

Disclosure Date: March 10, 2022 (last updated February 23, 2025)
There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity.
Attacker Value
Unknown

CVE-2022-0746

Disclosure Date: February 25, 2022 (last updated February 23, 2025)
Business Logic Errors in GitHub repository dolibarr/dolibarr prior to 16.0.
Attacker Value
Unknown

CVE-2022-21656

Disclosure Date: February 22, 2022 (last updated February 23, 2025)
Envoy is an open source edge and service proxy, designed for cloud-native applications. The default_validator.cc implementation used to implement the default certificate validation routines has a "type confusion" bug when processing subjectAltNames. This processing allows, for example, an rfc822Name or uniformResourceIndicator to be authenticated as a domain name. This confusion allows for the bypassing of nameConstraints, as processed by the underlying OpenSSL/BoringSSL implementation, exposing the possibility of impersonation of arbitrary servers. As a result Envoy will trust upstream certificates that should not be trusted.