Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome before 80.0.3987.87 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
7.5
CVSSv2
CVE-2020-9550
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an malicious user to sniff and spoof beacon requests remotely.
Rubetek Smarthome Firmware 2020
7.5
CVSSv2
CVE-2019-18259
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
Omron Plc Cj Firmware
Omron Plc Cs Firmware
5.8
CVSSv2
CVE-2020-0601
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file wa...
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows 10 1909
Microsoft Windows Server 2016 1909
Golang Go
71 Github repositories
5 Articles
4.3
CVSSv2
CVE-2019-8338
The signature verification routine in the Airmail GPG-PGP Plugin, versions 1.0 (9) and previous versions, does not verify the status of the signature at all, which allows remote malicious users to spoof arbitrary email signatures by crafting a signed email with an invalid signatu...
Gpg-pgp Project Gpg-pgp
NA
CVE-2023-35764
Insufficient verification of data authenticity issue in Survey Maker before 3.6.4 allows a remote unauthenticated malicious user to spoof an IP address when posting.
NA
CVE-2024-36052
RARLAB WinRAR prior to 7.00, on Windows, allows malicious users to spoof the screen output via ANSI escape sequences, a different issue than CVE-2024-33899.
5
CVSSv2
CVE-2005-1404
MyPHP Forum 1.0 allows remote malicious users to spoof the username by modifying the (1) nbuser parameter to post.php or (2) sender parameter to privmsg.php.
Myphp Forum Myphp Forum 3.0
Myphp Forum Myphp Forum 1.0
Myphp Forum Myphp Forum 2.0
7.5
CVSSv2
CVE-2001-0902
Microsoft IIS 5.0 allows remote malicious users to spoof web log entries via an HTTP request that includes hex-encoded newline or form-feed characters.
Microsoft Internet Information Services 5.0
5
CVSSv2
CVE-1999-0414
In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
Linux Linux Kernel 2.0.30
Linux Linux Kernel 2.0.37
Linux Linux Kernel 2.0.36
Linux Linux Kernel 2.0.35
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »