Page 19 of 906 results (0.889 seconds)

CVSS: 7.8EPSS: 0%CPEs: 7EXPL: 0

A type confusion issue was addressed with improved checks. ... Se solucionó un problema de confusión de tipos con comprobaciones mejoradas. • https://support.apple.com/en-us/HT213670 https://support.apple.com/en-us/HT213673 https://support.apple.com/en-us/HT213675 https://support.apple.com/en-us/HT213676 https://support.apple.com/en-us/HT213677 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

A type confusion issue was addressed with improved checks. ... Se solucionó un problema de confusión de tipos con comprobaciones mejoradas. • https://support.apple.com/en-us/HT213938 https://support.apple.com/en-us/HT213940 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 4.9EPSS: 0%CPEs: 8EXPL: 0

Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability Vulnerabilidad de divulgación de información de Online Certificate Status Protocol (OCSP) de Windows • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20662 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. A reverse proxy server built with `@fastify/reply-from` could misinterpret the incoming body by passing an header `ContentType: application/json ; charset=utf-8`. This can lead to bypass of security checks. This vulnerability has been patched in '@fastify/reply-from` version 9.6.0. fastify-reply-from es un complemento de Fastify para reenviar la solicitud HTTP actual a otro servidor. Un servidor proxy inverso creado con `@fastify/reply-from` podría malinterpretar el cuerpo entrante al pasar un encabezado `ContentType: application/json; charset=utf-8`. • https://github.com/fastify/fastify-reply-from/releases/tag/v9.6.0 https://github.com/fastify/fastify-reply-from/security/advisories/GHSA-v2v2-hph8-q5xp • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

The fixes for XSA-422 (Branch Type Confusion) and XSA-434 (Speculative Return Stack Overflow) are not IRQ-safe. ... Las correcciones para XSA-422 (Branch Type Confusion) y XSA-434 (Speculative Return Stack Overflow) no son seguras para IRQ. • https://xenbits.xenproject.org/xsa/advisory-446.html •