CVE-2021-46463
https://notcve.org/view.php?id=CVE-2021-46463
njs through 0.7.1, used in NGINX, was discovered to contain a control flow hijack caused by a Type Confusion vulnerability in njs_promise_perform_then(). Se ha detectado que njs versiones hasta 0.7.1, usado en NGINX, contiene un secuestro del flujo de control causado por una vulnerabilidad de Confusión de Tipos en la función njs_promise_perform_then() • https://github.com/nginx/njs/commit/6a40a85ff239497c6458c7dbef18f6a2736fe992 https://github.com/nginx/njs/issues/447 https://security.netapp.com/advisory/ntap-20220303-0007 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2022-0102
https://notcve.org/view.php?id=CVE-2022-0102
Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. Una confusión de tipos en V8 en Google Chrome versiones anteriores a 97.0.4692.71, permitía a un atacante remoto explotar potencialmente una corrupción de la pila por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html https://crbug.com/1260129 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5PAGL5M2KGYPN3VEQCRJJE6NA7D5YG5X https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQJB6ZPRLKV6WCMX2PRRRQBFAOXFBK6B https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MRWRAXAFR3JR7XCFWTHC2KALSZKWACCE • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2021-46152 – Siemens Simcenter Femap NEU File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-46152
Affected application contains a type confusion vulnerability while parsing NEU files. ... La aplicación afectada contiene una vulnerabilidad de confusión de tipos mientras analiza los archivos NEU. • https://cert-portal.siemens.com/productcert/pdf/ssa-609880.pdf https://www.zerodayinitiative.com/advisories/ZDI-22-293 https://www.zerodayinitiative.com/advisories/ZDI-22-294 https://www.zerodayinitiative.com/advisories/ZDI-22-295 https://www.zerodayinitiative.com/advisories/ZDI-22-296 • CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2022-23583 – `CHECK`-failures in binary ops in Tensorflow
https://notcve.org/view.php?id=CVE-2022-23583
In that case, calling the templated binary operator for the binary op would receive corrupted data, due to the type confusion involved. If `Tin` and `Tout` don't match the type of data in `out` and `input_*` tensors then `flat<*>` would interpret it wrongly. ... En ese caso, la llamada al operador binario templado para la op binaria recibiría datos corruptos, debido a la confusión de tipos implicada. • https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137 https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9 https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3 • CWE-617: Reachable Assertion CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') •
CVE-2021-23507 – Prototype Pollution
https://notcve.org/view.php?id=CVE-2021-23507
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 El paquete object-path-set versiones anteriores a 1.0.2, es vulnerable a una Contaminación de Prototipos por medio del método setPath, ya que permite a un atacante fusionar prototipos de objetos en él. *Nota:* Esta vulnerabilidad deriva de una corrección incompleta en https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 • https://github.com/skratchdot/object-path-set/blob/577f5299fed15bb9edd11c940ff3cf0b9f4748d5/index.js%23L8 https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761 https://snyk.io/blog/remediate-javascript-type-confusion-bypassed-input-validation https://snyk.io/vuln/SNYK-JS-OBJECTPATHSET-2388576 • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •