Vulnerabilities > Origin Validation Error

DATE CVE VULNERABILITY TITLE RISK
2024-03-12 CVE-2024-25996 An unauthenticated remote attacker can perform a remote code execution due to an origin validation error.
network
low complexity
CWE-346
5.3
2024-02-13 CVE-2024-24782 Origin Validation Error vulnerability in Hima products
An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN.
low complexity
hima CWE-346
4.3
2024-02-01 CVE-2024-24557 Origin Validation Error vulnerability in Mobyproject Moby
Moby is an open-source project created by Docker to enable software containerization.
local
low complexity
mobyproject CWE-346
7.8
2024-01-24 CVE-2024-23898 Origin Validation Error vulnerability in Jenkins
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
network
low complexity
jenkins CWE-346
8.8
2024-01-24 CVE-2024-0814 Origin Validation Error vulnerability in multiple products
Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page.
network
low complexity
google fedoraproject CWE-346
6.5
2024-01-23 CVE-2023-47193 Origin Validation Error vulnerability in Trendmicro Apex ONE 2019
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47194.
local
low complexity
trendmicro CWE-346
7.8
2024-01-23 CVE-2023-47194 Origin Validation Error vulnerability in Trendmicro Apex ONE 2019
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47195.
local
low complexity
trendmicro CWE-346
7.8
2024-01-23 CVE-2023-47195 Origin Validation Error vulnerability in Trendmicro Apex ONE 2019
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47196.
local
low complexity
trendmicro CWE-346
7.8
2024-01-23 CVE-2023-47196 Origin Validation Error vulnerability in Trendmicro Apex ONE 2019
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47197.
local
low complexity
trendmicro CWE-346
7.8
2024-01-23 CVE-2023-47197 Origin Validation Error vulnerability in Trendmicro Apex ONE 2019
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47198.
local
low complexity
trendmicro CWE-346
7.8