Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2007-0760
EQdkp 1.3.1 and previous versions authenticates administrative requests by verifying that the HTTP Referer header specifies an admin/ URL, which allows remote malicious users to read or modify account names and passwords via a spoofed Referer.
Eqdkp Eqdkp 1.3.1
1 EDB exploit
2.6
CVSSv2
CVE-2006-1740
Mozilla Firefox 1.x prior to 1.5 and 1.0.x prior to 1.0.8, Mozilla Suite prior to 1.7.13, and SeaMonkey prior to 1.0 allows remote malicious users to spoof secure site indicators such as the locked icon by opening the trusted site in a popup window, then changing the location to ...
Mozilla Firefox
Mozilla Firefox 1.0
Mozilla Firefox 1.0.1
Mozilla Firefox 1.0.2
Mozilla Firefox 1.0.3
Mozilla Firefox 1.0.4
Mozilla Firefox 1.0.5
Mozilla Firefox 1.0.6
Mozilla Firefox 1.5
Mozilla Mozilla Suite
Mozilla Mozilla Suite 1.7.6
Mozilla Mozilla Suite 1.7.7
4.3
CVSSv2
CVE-2015-0819
The UITour::onPageEvent function in Mozilla Firefox prior to 36.0 does not ensure that an API call originates from a foreground tab, which allows remote malicious users to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.
Mozilla Firefox
Mozilla Firefox 0.1
Mozilla Firefox 0.2
Mozilla Firefox 0.3
Mozilla Firefox 0.4
Mozilla Firefox 0.5
Mozilla Firefox 0.6
Mozilla Firefox 0.6.1
Mozilla Firefox 0.7
Mozilla Firefox 0.7.1
Mozilla Firefox 0.8
Mozilla Firefox 0.9
4.3
CVSSv3
CVE-2018-8383
A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8388.
Microsoft Edge -
1 Article
4
CVSSv2
CVE-2008-2809
Mozilla 1.9 M8 and previous versions, Mozilla Firefox 2 prior to 2.0.0.15, SeaMonkey 1.1.5 and other versions prior to 1.1.10, Netscape 9.0, and other Mozilla-based web browsers, when a user accepts an SSL server certificate on the basis of the CN domain name in the DN field, reg...
Mozilla Firefox 2.0.0.1
Mozilla Firefox 2.0.0.2
Mozilla Firefox 2.0.0.3
Mozilla Firefox 2.0.0.4
Mozilla Firefox 2.0.0.5
Mozilla Firefox 2.0.0.6
Mozilla Firefox 2.0.0.7
Mozilla Firefox 2.0.0.8
Mozilla Firefox 2.0.0.9
Mozilla Firefox 2.0.0.10
Mozilla Firefox 2.0.0.11
Mozilla Firefox 2.0.0.12
6.8
CVSSv2
CVE-2009-3985
Mozilla Firefox prior to 3.0.16 and 3.5.x prior to 3.5.6, and SeaMonkey prior to 2.0.1, allows remote malicious users to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank d...
Mozilla Firefox
Mozilla Firefox 0.1
Mozilla Firefox 0.2
Mozilla Firefox 0.3
Mozilla Firefox 0.4
Mozilla Firefox 0.5
Mozilla Firefox 0.6
Mozilla Firefox 0.6.1
Mozilla Firefox 0.7
Mozilla Firefox 0.7.1
Mozilla Firefox 0.8
Mozilla Firefox 0.9
5.3
CVSSv3
CVE-2023-51766
Exim prior to 4.97.1 allows SMTP smuggling in certain PIPELINING/CHUNKING configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because Ex...
Exim Exim
Fedoraproject Extra Packages For Enterprise Linux 7.0
Fedoraproject Extra Packages For Enterprise Linux 8.0
Fedoraproject Extra Packages For Enterprise Linux 9.0
Fedoraproject Fedora 38
Fedoraproject Fedora 39
Debian Debian Linux 10.0
5.1
CVSSv2
CVE-2009-2409
The Network Security Services (NSS) library prior to 3.12.3, as used in Firefox; GnuTLS prior to 2.6.4 and 2.7.4; OpenSSL 0.9.8 up to and including 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote malicious users to spoof certificates by us...
Mozilla Firefox
Mozilla Nss
Mozilla Nss 3.0
Mozilla Nss 3.2
Mozilla Nss 3.2.1
Mozilla Nss 3.3
Mozilla Nss 3.3.1
Mozilla Nss 3.3.2
Mozilla Nss 3.4
Mozilla Nss 3.4.1
Mozilla Nss 3.4.2
Mozilla Nss 3.4.3
7.1
CVSSv2
CVE-2013-5507
The IPsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 prior to 9.1(1.7), when an IPsec VPN tunnel is enabled, allows remote malicious users to cause a denial of service (device reload) via a (1) ICMP or (2) ICMPv6 packet that is improperly handled durin...
Cisco Adaptive Security Appliance Software 9.1
10
CVSSv2
CVE-2013-5509
The SSL implementation in Cisco Adaptive Security Appliance (ASA) Software 9.0 prior to 9.0(2.6) and 9.1 prior to 9.1(2) allows remote malicious users to bypass authentication, and obtain VPN access or administrative access, via a crafted X.509 client certificate, aka Bug ID CSCu...
Cisco Adaptive Security Appliance Software 9.0
Cisco Adaptive Security Appliance Software 9.1
Preferred Score:
CVSSv3
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2025-46656
unknown
CVE-2025-46577
CVE-2025-32979
paicoding
XPath injection
hackmd
CVE-2025-3643
opplus
CSRF
local users
CVE-2025-32433
CVE-2025-32432
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »