Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-1107
Unspecified vulnerability in Google Chrome prior to 9.0.597.107 allows remote malicious users to spoof the URL bar via unknown vectors.
Google Chrome
Apple Safari
Apple Iphone Os
5
CVSSv2
CVE-2002-0321
Yahoo! Messenger 5.0 allows remote malicious users to spoof other users by modifying the username and using the spoofed username for social engineering or denial of service (flooding) attacks.
Yahoo Messenger 5.0
7.2
CVSSv2
CVE-2017-0050
The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to sp...
Microsoft Windows Server 2016
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows 10 1607
Microsoft Windows Rt 8.1
Microsoft Windows Vista
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
7.5
CVSSv2
CVE-2006-7009
Joomla! prior to 1.0.10 allows remote malicious users to spoof the frontend submission forms, which has unknown impact and attack vectors.
Joomla Joomla 1.0.4
Joomla Joomla 1.0.5
Joomla Joomla 1.0.6
Joomla Joomla 1.0.7
Joomla Joomla 1.0.0
Joomla Joomla 1.0.2
Joomla Joomla 1.0.9
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.8
7.5
CVSSv2
CVE-2001-0162
WinCE 3.0.9348 generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Microsoft Windows Embedded Compact 3.0.9348
1 EDB exploit
2.6
CVSSv2
CVE-2016-7209
Microsoft Edge allows remote malicious users to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."
Microsoft Edge
4.3
CVSSv2
CVE-2022-30738
Improper check in Loader in Samsung Internet before 17.0.1.69 allows malicious users to spoof address bar via executing script.
Samsung Internet
5
CVSSv2
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
5
CVSSv2
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.0
Apple Safari 1.1
1 EDB exploit
4.3
CVSSv2
CVE-2012-0674
Safari in Apple iOS prior to 5.1.1 allows remote malicious users to spoof the location bar's URL via a crafted web site.
Apple Iphone Os 4.0
Apple Iphone Os 4.0.2
Apple Iphone Os 4.0.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 4.3.2
Apple Iphone Os 4.3.1
Apple Iphone Os 4.3.0
Apple Iphone Os 4.2.8
Apple Iphone Os 3.2.1
Apple Iphone Os 3.1
Apple Iphone Os 5.0.1
Apple Iphone Os
Apple Iphone Os 4.2.1
Apple Iphone Os 3.2
Apple Iphone Os 3.2.2
Apple Iphone Os 3.1.3
Apple Iphone Os 4.3.3
Apple Iphone Os 4.2.5
Apple Iphone Os 4.1
Apple Iphone Os 3.1.2
Apple Iphone Os 3.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »