Vulnerabilities > Origin Validation Error
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-12-11 | CVE-2023-49805 | Origin Validation Error vulnerability in multiple products Uptime Kuma is an easy-to-use self-hosted monitoring tool. | 8.8 |
2023-11-06 | CVE-2023-28794 | Origin Validation Error vulnerability in Zscaler Client Connector 1.3/1.3.0.31/1.3.1 Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Privilege Abuse. | 6.5 |
2023-11-01 | CVE-2023-5851 | Origin Validation Error vulnerability in multiple products Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |
2023-11-01 | CVE-2023-5853 | Origin Validation Error vulnerability in multiple products Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |
2023-11-01 | CVE-2023-5858 | Origin Validation Error vulnerability in multiple products Inappropriate implementation in WebApp Provider in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. | 4.3 |
2023-11-01 | CVE-2023-5859 | Origin Validation Error vulnerability in multiple products Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. | 4.3 |
2023-10-23 | CVE-2023-5718 | Origin Validation Error vulnerability in Vuejs Devtools 6.5.0 The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. | 4.3 |
2023-10-23 | CVE-2021-26737 | Origin Validation Error vulnerability in Zscaler Client Connector The Zscaler Client Connector for macOS prior to 3.6 did not sufficiently validate RPC clients. | 4.7 |
2023-10-23 | CVE-2023-28795 | Origin Validation Error vulnerability in Zscaler Client Connector 1.3/1.3.0.31/1.3.1 Origin Validation Error vulnerability in Zscaler Client Connector on Linux allows Inclusion of Code in Existing Process. | 7.8 |
2023-10-11 | CVE-2023-44189 | Origin Validation Error vulnerability in Juniper Junos OS Evolved An Origin Validation vulnerability in MAC address validation of Juniper Networks Junos OS Evolved on PTX10003 Series allows a network-adjacent attacker to bypass MAC address checking, allowing MAC addresses not intended to reach the adjacent LAN to be forwarded to the downstream network. | 5.4 |