Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-1183
WebAPP prior to 0.9.9.5 allows remote authenticated users to spoof another user's Real Name via whitespace, which has unknown impact and attack vectors.
Web-app.org Webapp
8.1
CVSSv3
CVE-2020-0601
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file wa...
Microsoft Windows 10 1607
Microsoft Windows Server 2016 -
Microsoft Windows 10 -
Microsoft Windows 10 1709
Microsoft Windows 10 1803
Microsoft Windows Server 2016 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows Server 2016 1903
Microsoft Windows 10 1903
Microsoft Windows 10 1909
Microsoft Windows Server 2016 1909
Golang Go
71 Github repositories
5 Articles
NA
CVE-2015-5904
Safari in Apple iOS prior to 9 allows remote malicious users to spoof the relationship between URLs and web content via a crafted web site.
Apple Iphone Os
6.5
CVSSv3
CVE-2018-0560
Hatena Bookmark App for iOS Version 3.0 to 3.70 allows remote malicious users to spoof the address bar via vectors related to URL display.
Hatena Hatena Bookmark
9.8
CVSSv3
CVE-2019-18259
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.
Omron Plc Cj Firmware
Omron Plc Cs Firmware
6.5
CVSSv3
CVE-2020-6502
Incorrect implementation in permissions in Google Chrome before 80.0.3987.87 allowed a remote malicious user to spoof security UI via a crafted HTML page.
Google Chrome
9.8
CVSSv3
CVE-2020-9550
Rubetek SmartHome 2020 devices use unencrypted 433 MHz communication between controllers and beacons, allowing an malicious user to sniff and spoof beacon requests remotely.
Rubetek Smarthome Firmware 2020
NA
CVE-2007-4162
TIBCO Rendezvous (RV) 7.5.2 does not protect confidentiality or integrity of inter-daemon communication, which allows remote malicious users to capture and spoof traffic.
Tibco Rendezvous 7.5.2
NA
CVE-2011-1452
Google Chrome prior to 11.0.696.57 allows user-assisted remote malicious users to spoof the URL bar via vectors involving a redirect and a manual reload.
Google Chrome
NA
CVE-2010-4036
Google Chrome prior to 7.0.517.41 does not properly handle the unloading of a page, which allows remote malicious users to spoof URLs via unspecified vectors.
Google Chrome 6.0.472.50
Google Chrome 6.0.472.54
Google Chrome 6.0.472.62
Google Chrome 6.0.455.0
Google Chrome 6.0.472.59
Google Chrome 6.0.472.14
Google Chrome 6.0.472.15
Google Chrome 6.0.472.6
Google Chrome 6.0.472.7
Google Chrome 6.0.471.0
Google Chrome 6.0.470.0
Google Chrome 6.0.466.1
Google Chrome 6.0.466.0
Google Chrome 6.0.472.45
Google Chrome 6.0.472.46
Google Chrome 6.0.472.37
Google Chrome 6.0.472.38
Google Chrome 6.0.472.39
Google Chrome 6.0.472.31
Google Chrome 6.0.472.30
Google Chrome 6.0.472.23
Google Chrome 6.0.472.22
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »