CVE-2023-0703
https://notcve.org/view.php?id=CVE-2023-0703
Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. • https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html https://crbug.com/1405574 https://security.gentoo.org/glsa/202309-17 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2023-0702
https://notcve.org/view.php?id=CVE-2023-0702
Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. • https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html https://crbug.com/1316301 https://security.gentoo.org/glsa/202309-17 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2023-20616
https://notcve.org/view.php?id=CVE-2023-20616
In ion, there is a possible out of bounds read due to type confusion. • https://corp.mediatek.com/product-security-bulletin/February-2023 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2022-4205
https://notcve.org/view.php?id=CVE-2022-4205
In Gitlab EE/CE before 15.6.1, 15.5.5 and 15.4.6 using a branch with a hexadecimal name could override an existing hash. En Gitlab EE/CE anterior a 15.6.1, 15.5.5 y 15.4.6, el uso de una rama con un nombre hexadecimal podía anular un hash existente. • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4205.json https://gitlab.com/gitlab-org/gitlab/-/issues/374082 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2023-23608 – spotipy Path traversal vulnerability that may lead to type confusion in URI handling code
https://notcve.org/view.php?id=CVE-2023-23608
Spotipy is a light weight Python library for the Spotify Web API. In versions prior to 2.22.1, if a malicious URI is passed to the library, the library can be tricked into performing an operation on a different API endpoint than intended. The code Spotipy uses to parse URIs and URLs allows an attacker to insert arbitrary characters into the path that is used for API requests. Because it is possible to include ". • https://github.com/spotipy-dev/spotipy/security/advisories/GHSA-q764-g6fm-555v • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •