Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
origin vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2017-18016
Parity Browser 1.6.10 and previous versions allows remote malicious users to bypass the Same Origin Policy and obtain sensitive information by requesting other websites via the Parity web proxy engine (reusing the current website's token, which is not bound to an origin).
Parity Browser 1.6.10
1 EDB exploit
2.6
CVSSv2
CVE-2011-3649
Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote malicious users to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this d...
Mozilla Firefox 7.0
Mozilla Thunderbird 7.0
4.3
CVSSv2
CVE-2010-0648
Mozilla Firefox, possibly prior to 3.6, allows remote malicious users to discover a redirect's target URL, for the session of a specific user of a web site, by placing the site's URL in the HREF attribute of a stylesheet LINK element, and then reading the document.style...
Mozilla Firefox
Mozilla Firefox 3.5.6
Mozilla Firefox 3.5.5
Mozilla Firefox 3.0.8
Mozilla Firefox 3.0.7
Mozilla Firefox 3.0.14
Mozilla Firefox 3.0.13
Mozilla Firefox 2.0.0.18
Mozilla Firefox 2.0.0.17
Mozilla Firefox 2.0.0.10
Mozilla Firefox 2.0.0.9
Mozilla Firefox 3.5.4
Mozilla Firefox 3.5.3
Mozilla Firefox 3.0.6
Mozilla Firefox 3.0.5
Mozilla Firefox 3.0.12
Mozilla Firefox 3.0.11
Mozilla Firefox 2.0.0.16
Mozilla Firefox 2.0.0.15
Mozilla Firefox 2.0.0.8
Mozilla Firefox 2.0.0.7
Mozilla Firefox 2.0
7.5
CVSSv2
CVE-2002-0783
Opera 6.01, 6.0, and 5.12 allows remote malicious users to execute arbitrary JavaScript in the security context of other sites by setting the location of a frame or iframe to a Javascript: URL.
Opera Software Opera Web Browser 5.12
Opera Software Opera Web Browser 6.0
Opera Software Opera Web Browser 6.0.1
1 EDB exploit
4.3
CVSSv2
CVE-2018-0278
A vulnerability in the management console of Cisco Firepower System Software could allow an unauthenticated, remote malicious user to access sensitive data about the system. The vulnerability is due to improper cross-origin domain protections for the WebSocket protocol. An attack...
Cisco Firepower Management Center 6.2.0
Cisco Firepower Management Center 6.2.1
Cisco Firepower Management Center 6.2.2
Cisco Firepower Management Center 6.2.3
Cisco Firepower Management Center 6.1.0
5
CVSSv2
CVE-2011-3653
Mozilla Firefox prior to 8.0 and Thunderbird prior to 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote malicious users to bypass the Same Origin Policy and read image data via vectors related ...
Mozilla Firefox 6.0.1
Mozilla Firefox 6.0
Mozilla Firefox 4.0
Mozilla Firefox 3.6.24
Mozilla Firefox 3.6.18
Mozilla Firefox 3.6.6
Mozilla Firefox 3.6.22
Mozilla Firefox 3.6.2
Mozilla Firefox 7.0
Mozilla Firefox 6.0.2
Mozilla Firefox 3.6.12
Mozilla Firefox 3.6.8
Mozilla Firefox 3.6.20
Mozilla Firefox 3.6.21
Mozilla Firefox 3.6.16
Mozilla Firefox 3.6.14
Mozilla Firefox 3.5.7
Mozilla Firefox 3.5.14
Mozilla Firefox 3.5.12
Mozilla Firefox 3.0.1
Mozilla Firefox 3.0.5
Mozilla Firefox 3.0.14
4.3
CVSSv2
CVE-2020-17515
The "origin" parameter passed to some of the endpoints like '/trigger' was vulnerable to XSS exploit. This issue affects Apache Airflow versions before 1.10.13. This is same as CVE-2020-13944 but the implemented fix in Airflow 1.10.13 did not fix the issue com...
Apache Airflow
NA
CVE-2023-47193
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
NA
CVE-2023-47195
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
NA
CVE-2023-47196
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »