Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2106
Unspecified vulnerability in Google Chrome prior to 5.0.375.55 might allow remote malicious users to spoof the URL bar via vectors involving unload event handlers.
Google Chrome
8.1
CVSSv3
CVE-2020-0601
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file wa...
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows 10 1909
Microsoft Windows Server 2016 1909
Golang Go
71 Github repositories
5 Articles
NA
CVE-2004-2288
Cross-site scripting (XSS) vulnerability in index.php in Jelsoft vBulletin allows remote malicious users to spoof parts of a website via the loc parameter.
Jelsoft Vbulletin 2.0 Rc3
Jelsoft Vbulletin 2.2.1
Jelsoft Vbulletin 2.2.6
Jelsoft Vbulletin 2.2.8
Jelsoft Vbulletin 2.3.0
Jelsoft Vbulletin 3.0 Beta 3
Jelsoft Vbulletin 3.0 Beta 5
Jelsoft Vbulletin 2.2.2
Jelsoft Vbulletin 2.2.3
Jelsoft Vbulletin 2.2.4
Jelsoft Vbulletin 2.2.5
Jelsoft Vbulletin 3.0 Beta 7
Jelsoft Vbulletin 3.0 Gamma
Jelsoft Vbulletin 1.0.1
Jelsoft Vbulletin 2.0.3
Jelsoft Vbulletin 2.3.2
Jelsoft Vbulletin 2.3.3
Jelsoft Vbulletin 2.3.4
Jelsoft Vbulletin 3.0 Beta 2
Jelsoft Vbulletin 2.0 Rc2
Jelsoft Vbulletin 2.2.0
Jelsoft Vbulletin 2.2.7
1 EDB exploit
NA
CVE-2010-4036
Google Chrome prior to 7.0.517.41 does not properly handle the unloading of a page, which allows remote malicious users to spoof URLs via unspecified vectors.
Google Chrome 6.0.472.50
Google Chrome 6.0.472.54
Google Chrome 6.0.472.62
Google Chrome 6.0.455.0
Google Chrome 6.0.472.59
Google Chrome 6.0.472.14
Google Chrome 6.0.472.15
Google Chrome 6.0.472.6
Google Chrome 6.0.472.7
Google Chrome 6.0.471.0
Google Chrome 6.0.470.0
Google Chrome 6.0.466.1
Google Chrome 6.0.466.0
Google Chrome 6.0.472.45
Google Chrome 6.0.472.46
Google Chrome 6.0.472.37
Google Chrome 6.0.472.38
Google Chrome 6.0.472.39
Google Chrome 6.0.472.31
Google Chrome 6.0.472.30
Google Chrome 6.0.472.23
Google Chrome 6.0.472.22
NA
CVE-2015-5904
Safari in Apple iOS prior to 9 allows remote malicious users to spoof the relationship between URLs and web content via a crafted web site.
Apple Iphone Os
NA
CVE-2007-4162
TIBCO Rendezvous (RV) 7.5.2 does not protect confidentiality or integrity of inter-daemon communication, which allows remote malicious users to capture and spoof traffic.
Tibco Rendezvous 7.5.2
9.8
CVSSv3
CVE-2020-9550
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an malicious user to sniff and spoof beacon requests remotely.
Rubetek Smarthome Firmware 2020
9.8
CVSSv3
CVE-2019-18259
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
Omron Plc Cj Firmware
Omron Plc Cs Firmware
5.4
CVSSv3
CVE-2020-11814
A Host Header Injection vulnerability in qdPM 9.1 may allow an malicious user to spoof a particular header and redirect users to malicious websites.
Qdpm Qdpm 9.1
6.5
CVSSv3
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome before 80.0.3987.87 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-49223
CVE-2024-0044
information disclosure
CVE-2024-35753
HTML injection
CVE-2024-21306
CVE-2024-35733
SQL injection
CVE-2024-35732
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »