Vulnerabilities > Origin Validation Error
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-03-12 | CVE-2024-25996 | An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. | 5.3 |
2024-02-13 | CVE-2024-24782 | Origin Validation Error vulnerability in Hima products An unauthenticated attacker can send a ping request from one network to another through an error in the origin verification even though the ports are separated by VLAN. | 4.3 |
2024-02-01 | CVE-2024-24557 | Origin Validation Error vulnerability in Mobyproject Moby Moby is an open-source project created by Docker to enable software containerization. | 7.8 |
2024-01-24 | CVE-2024-23898 | Origin Validation Error vulnerability in Jenkins Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller. | 8.8 |
2024-01-24 | CVE-2024-0814 | Origin Validation Error vulnerability in multiple products Incorrect security UI in Payments in Google Chrome prior to 121.0.6167.85 allowed a remote attacker to potentially spoof security UI via a crafted HTML page. | 6.5 |
2024-01-23 | CVE-2023-47193 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47194. | 7.8 |
2024-01-23 | CVE-2023-47194 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47195. | 7.8 |
2024-01-23 | CVE-2023-47195 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47196. | 7.8 |
2024-01-23 | CVE-2023-47196 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47197. | 7.8 |
2024-01-23 | CVE-2023-47197 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47198. | 7.8 |