Show filters
142 Total Results
Displaying 31-40 of 142
Sort by:
Attacker Value
Unknown

CVE-2021-1829

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.3. An application may be able to execute arbitrary code with kernel privileges.
Attacker Value
Unknown

CVE-2021-30758

Disclosure Date: September 08, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2021-23438

Disclosure Date: September 01, 2021 (last updated February 23, 2025)
This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input.
Attacker Value
Unknown

CVE-2021-23436

Disclosure Date: September 01, 2021 (last updated February 23, 2025)
This affects the package immer before 9.0.6. A type confusion vulnerability can lead to a bypass of CVE-2020-28477 when the user-provided keys used in the path parameter are arrays. In particular, this bypass is possible because the condition (p === "__proto__" || p === "constructor") in applyPatches_ returns false if p is ['__proto__'] (or ['constructor']). The === operator (strict equality operator) returns false if the operands have different type.
Attacker Value
Unknown

CVE-2021-23434

Disclosure Date: August 27, 2021 (last updated February 23, 2025)
This affects the package object-path before 0.11.6. A type confusion vulnerability can lead to a bypass of CVE-2020-15256 when the path components used in the path parameter are arrays. In particular, the condition currentPath === '__proto__' returns false if currentPath is ['__proto__']. This is because the === operator returns always false when the type of the operands is different.
Attacker Value
Unknown

CVE-2021-30599

Disclosure Date: August 26, 2021 (last updated February 23, 2025)
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Attacker Value
Unknown

CVE-2021-30598

Disclosure Date: August 26, 2021 (last updated February 23, 2025)
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
Attacker Value
Unknown

CVE-2021-31008

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 15.1, tvOS 15.1, iOS 15 and iPadOS 15, macOS Monterey 12.0.1, watchOS 8.1. Processing maliciously crafted web content may lead to code execution.
Attacker Value
Unknown

CVE-2021-30954

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.
Attacker Value
Unknown

CVE-2021-30859

Disclosure Date: August 24, 2021 (last updated February 23, 2025)
A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, Security Update 2021-005 Catalina. A malicious application may be able to execute arbitrary code with kernel privileges.