📦 Whale
by Navercorp
🔍 What is Whale?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability in Whale browser allows attackers to escape iframe sandbox restrictions in sidebar environments, potentially executing malicious code in the parent context. It affects all users run...
This vulnerability in Whale Browser allows attackers to escape iframe sandbox restrictions in dual-tab environments, potentially enabling cross-origin attacks. It affects all users running vulnerable ...
This vulnerability allows attackers to execute malicious JavaScript code in Whale browser for iOS by exploiting a flaw in how the browser handles crafted JavaScript schemes. Users running vulnerable v...
CVE-2022-24074 is a critical vulnerability in Whale Browser's default Whale Bridge extension that allows compromised rendering processes to send arbitrary messages and gain control of the extension. T...
This vulnerability allows attackers to bypass the Same-Origin Policy in Whale browser's sidebar environment, potentially enabling cross-origin data theft or manipulation. Users running Whale browser v...
This vulnerability allows attackers to bypass Content Security Policy (CSP) protections in Whale browser by exploiting a specific scheme in dual-tab environments. Attackers could execute malicious scr...
A vulnerability in Whale browser's Web Request API allowed malicious extensions to block access to the extension store or redirect users to arbitrary URLs when attempting to visit the store. This affe...