Vulnerabilities > Origin Validation Error
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-23 | CVE-2023-47198 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47199. | 7.8 |
2024-01-23 | CVE-2023-47199 | Origin Validation Error vulnerability in Trendmicro Apex ONE 2019 An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47193. | 7.8 |
2024-01-23 | CVE-2023-47200 | Origin Validation Error vulnerability in Trendmicro Apex ONE A plug-in manager origin validation vulnerability in the Trend Micro Apex One security agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. This vulnerability is similar to, but not identical to, CVE-2023-47201. | 7.8 |
2024-01-23 | CVE-2024-0749 | Origin Validation Error vulnerability in multiple products A phishing site could have repurposed an `about:` dialog to show phishing content with an incorrect origin in the address bar. | 4.3 |
2023-12-11 | CVE-2023-49803 | Origin Validation Error vulnerability in Koajs Cross-Origin Resource Sharing for KOA @koa/cors npm provides Cross-Origin Resource Sharing (CORS) for koa, a web framework for Node.js. | 7.5 |
2023-12-11 | CVE-2023-49805 | Origin Validation Error vulnerability in multiple products Uptime Kuma is an easy-to-use self-hosted monitoring tool. | 8.8 |
2023-11-06 | CVE-2023-28794 | Origin Validation Error vulnerability in Zscaler Client Connector 1.3/1.3.0.31/1.3.1 Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. | 6.5 |
2023-11-01 | CVE-2023-5851 | Origin Validation Error vulnerability in multiple products Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |
2023-11-01 | CVE-2023-5853 | Origin Validation Error vulnerability in multiple products Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |
2023-11-01 | CVE-2023-5858 | Origin Validation Error vulnerability in multiple products Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |