Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv2
CVE-2011-4092
obby (aka libobby) does not verify SSL server certificates, which allows remote malicious users to spoof servers via an arbitrary certificate.
Ubuntu Developers Obby -
4.3
CVSSv2
CVE-2012-0674
Safari in Apple iOS prior to 5.1.1 allows remote malicious users to spoof the location bar's URL via a crafted web site.
Apple Iphone Os 4.0
Apple Iphone Os
Apple Iphone Os 4.3.2
Apple Iphone Os 4.0.2
Apple Iphone Os 4.0.1
Apple Iphone Os 3.2
Apple Iphone Os 5.0
Apple Iphone Os 4.2.8
Apple Iphone Os 4.1
Apple Iphone Os 3.1.2
Apple Iphone Os 4.3.5
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.1
Apple Iphone Os 4.2.5
Apple Iphone Os 3.2.1
Apple Iphone Os 3.1
Apple Iphone Os 5.0.1
Apple Iphone Os 4.2.1
Apple Iphone Os 3.0
Apple Iphone Os 4.3.3
Apple Iphone Os 4.3.0
Apple Iphone Os 3.2.2
4.3
CVSSv2
CVE-2013-5152
Mobile Safari in Apple iOS prior to 7 allows remote malicious users to spoof the URL bar via a crafted web site.
Apple Iphone Os 6.1.2
Apple Iphone Os 3.0
Apple Iphone Os 3.2
Apple Iphone Os 3.1.3
Apple Iphone Os 1.0.2
Apple Iphone Os 4.3.2
Apple Iphone Os 4.0.2
Apple Iphone Os
Apple Iphone Os 2.2
Apple Iphone Os 1.1.1
Apple Iphone Os 6.1.3
Apple Iphone Os 5.1
Apple Iphone Os 4.2.8
Apple Iphone Os 6.0.2
Apple Iphone Os 4.1
Apple Iphone Os 2.0.0
Apple Iphone Os 3.1.2
Apple Iphone Os 3.0.1
Apple Iphone Os 4.3.1
Apple Iphone Os 4.2.5
Apple Iphone Os 1.1.2
Apple Iphone Os 3.1
7.5
CVSSv2
CVE-2000-0178
ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Foundrynet Serveriron 5.1.10t12
Foundrynet Serveriron 6.0
4.3
CVSSv2
CVE-2020-5812
Nessus AMI versions 8.12.0 and previous versions were found to either not validate, or incorrectly validate, a certificate which could allow an malicious user to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
Tenable Nessus Amazon Machine Image
5
CVSSv2
CVE-2014-0364
The ParseRoster component in the Ignite Realtime Smack XMPP API prior to 4.0.0-rc1 does not verify the from attribute of a roster-query IQ stanza, which allows remote malicious users to spoof IQ responses via a crafted attribute.
Igniterealtime Smack
5.8
CVSSv2
CVE-2020-0601
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file wa...
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows Server 2016 1909
Microsoft Windows 10 1909
Golang Go
71 Github repositories
5 Articles
4.3
CVSSv2
CVE-2020-15047
MSA/SMTP.cpp in Trojita prior to 0.8 ignores certificate-verification errors, which allows man-in-the-middle malicious users to spoof SMTP servers.
Trojita Project Trojita
4.3
CVSSv2
CVE-2011-2840
Google Chrome prior to 14.0.835.163 allows user-assisted remote malicious users to spoof the URL bar via vectors related to "unusual user interaction."
Google Chrome
4.6
CVSSv2
CVE-2001-0163
Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Cisco Aironet Ap340
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »