Vulnerabilities > Origin Validation Error

DATE CVE VULNERABILITY TITLE RISK
2012-03-22 CVE-2011-3056 Origin Validation Error vulnerability in Google Chrome
Google Chrome before 17.0.963.83 allows remote attackers to bypass the Same Origin Policy via vectors involving a "magic iframe."
6.8
2005-05-02 CVE-2005-0877 Origin Validation Error vulnerability in Thekelleys Dnsmasq
Dnsmasq before 2.21 allows remote attackers to poison the DNS cache via answers to queries that were not made by Dnsmasq.
network
low complexity
thekelleys CWE-346
7.5
2004-01-05 CVE-2003-0981 Origin Validation Error vulnerability in Freescripts Visitorbook LE
FreeScripts VisitorBook LE (visitorbook.pl) logs the reverse DNS name of a visiting host, which allows remote attackers to spoof the origin of their incoming requests and facilitate cross-site scripting (XSS) attacks.
network
low complexity
freescripts CWE-346
6.1
2003-05-12 CVE-2003-0174 Origin Validation Error vulnerability in SGI Irix
The LDAP name service (nsd) in IRIX 6.5.19 and earlier does not properly verify if the USERPASSWORD attribute has been provided by an LDAP server, which could allow attackers to log in without a password.
network
low complexity
sgi CWE-346
critical
9.8
2001-08-31 CVE-2001-1452 Origin Validation Error vulnerability in Microsoft Windows 2000 and Windows NT
By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.
network
low complexity
microsoft CWE-346
7.5
2000-04-14 CVE-2000-1218 Origin Validation Error vulnerability in Microsoft products
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
network
low complexity
microsoft CWE-346
critical
9.8
1999-11-16 CVE-1999-1549 Origin Validation Error vulnerability in Lynx Project Lynx 2.7/2.8
Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands.
local
low complexity
lynx-project CWE-346
7.8