Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
origin vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv3
CVE-2023-47197
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47198
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2023-47199
An origin validation vulnerability in the Trend Micro Apex One security agent could allow a local malicious user to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order t...
Trendmicro Apex One 2019
Trendmicro Apex One
7.8
CVSSv3
CVE-2021-45441
A origin validation error vulnerability in Trend Micro Apex One (on-prem and SaaS) could allow a local attacker drop and manipulate a specially crafted file to issue commands over a certain pipe and elevate to a higher level of privileges. Please note: an attacker must first obta...
Trendmicro Worry-free Business Security 10.0
Trendmicro Apex One 2019
Trendmicro Worry-free Business Security Services -
NA
CVE-2014-1552
Mozilla Firefox prior to 31.0 and Thunderbird prior to 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote malicious users to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.
Mozilla Thunderbird 24.6
Mozilla Thunderbird 24.5
Mozilla Thunderbird 24.4
Mozilla Firefox
Mozilla Thunderbird 24.1
Mozilla Thunderbird 24.1.1
Mozilla Thunderbird 24.0
Mozilla Thunderbird 24.0.1
Mozilla Thunderbird
Mozilla Thunderbird 24.2
Mozilla Thunderbird 24.3
NA
CVE-2015-7184
The fetch API implementation in Mozilla Firefox prior to 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote malicious users to ...
Mozilla Firefox
NA
CVE-2002-0723
Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote malicious users to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag."
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2024-36302
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific fl...
NA
CVE-2024-36303
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Apex One Security Agent. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific fl...
NA
CVE-2003-1071
rpc.walld (wall daemon) for Solaris 2.6 through 9 allows local users to send messages to logged on users that appear to come from arbitrary user IDs by closing stderr before executing wall, then supplying a spoofed from header.
Sun Sunos 5.7
Sun Solaris 7.0
Sun Sunos 5.8
Sun Solaris 8.0
Sun Sunos 5.5.1
Sun Solaris 2.5.1
Sun Solaris 9.0
Sun Solaris 2.6
Sun Sunos -
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »