Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
7.5
CVSSv2
CVE-2020-9550
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an malicious user to sniff and spoof beacon requests remotely.
Rubetek Smarthome Firmware 2020
5.8
CVSSv2
CVE-2011-1452
Google Chrome prior to 11.0.696.57 allows user-assisted remote malicious users to spoof the URL bar via vectors involving a redirect and a manual reload.
Google Chrome
4.3
CVSSv2
CVE-2015-5904
Safari in Apple iOS prior to 9 allows remote malicious users to spoof the relationship between URLs and web content via a crafted web site.
Apple Iphone Os
4.3
CVSSv2
CVE-2014-2359
OleumTech Wireless Sensor Network devices allow remote malicious users to obtain sensitive information about sensor nodes or spoof devices by reading cleartext protocol data.
Oleumtech Ft1 Firmware -
Oleumtech Ad1 Firmware -
4.3
CVSSv2
CVE-2004-2288
Cross-site scripting (XSS) vulnerability in index.php in Jelsoft vBulletin allows remote malicious users to spoof parts of a website via the loc parameter.
Jelsoft Vbulletin 2.0 Rc3
Jelsoft Vbulletin 2.2.1
Jelsoft Vbulletin 2.2.6
Jelsoft Vbulletin 2.2.8
Jelsoft Vbulletin 2.3.0
Jelsoft Vbulletin 3.0 Beta 3
Jelsoft Vbulletin 3.0 Beta 5
Jelsoft Vbulletin 2.2.2
Jelsoft Vbulletin 2.2.3
Jelsoft Vbulletin 2.2.4
Jelsoft Vbulletin 2.2.5
Jelsoft Vbulletin 3.0 Beta 7
Jelsoft Vbulletin 3.0 Gamma
Jelsoft Vbulletin 1.0.1
Jelsoft Vbulletin 2.0.3
Jelsoft Vbulletin 2.3.2
Jelsoft Vbulletin 2.3.3
Jelsoft Vbulletin 2.3.4
Jelsoft Vbulletin 3.0 Beta 2
Jelsoft Vbulletin 2.0 Rc2
Jelsoft Vbulletin 2.2.0
Jelsoft Vbulletin 2.2.7
1 EDB exploit
7.5
CVSSv2
CVE-2008-5657
CRLF injection vulnerability in Quassel Core prior to 0.3.0.3 allows remote malicious users to spoof IRC messages as other users via a crafted CTCP message.
Quassel Quassel Core 0.3.0
Quassel Quassel Core 0.2.0
Quassel Quassel Core 0.1.0
Quassel Quassel Core
Quassel Quassel Core 0.3.0.1
7.5
CVSSv2
CVE-2019-18259
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
Omron Plc Cj Firmware
Omron Plc Cs Firmware
6.8
CVSSv2
CVE-2010-4036
Google Chrome prior to 7.0.517.41 does not properly handle the unloading of a page, which allows remote malicious users to spoof URLs via unspecified vectors.
Google Chrome 6.0.472.50
Google Chrome 6.0.472.54
Google Chrome 6.0.472.62
Google Chrome 6.0.455.0
Google Chrome 6.0.472.59
Google Chrome 6.0.472.14
Google Chrome 6.0.472.15
Google Chrome 6.0.472.6
Google Chrome 6.0.472.7
Google Chrome 6.0.471.0
Google Chrome 6.0.470.0
Google Chrome 6.0.466.1
Google Chrome 6.0.466.0
Google Chrome 6.0.472.45
Google Chrome 6.0.472.46
Google Chrome 6.0.472.37
Google Chrome 6.0.472.38
Google Chrome 6.0.472.39
Google Chrome 6.0.472.31
Google Chrome 6.0.472.30
Google Chrome 6.0.472.23
Google Chrome 6.0.472.22
4.3
CVSSv2
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome before 80.0.3987.87 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »