Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-39137
An issue in Archive v3.3.7 allows malicious users to spoof zip filenames which can lead to inconsistent filename parsing.
Archive Project Archive 3.3.7
7.2
CVSSv2
CVE-2017-0050
The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to sp...
Microsoft Windows Server 2016
Microsoft Windows 8
Microsoft Windows 7
Microsoft Windows 10 1607
Microsoft Windows Rt 8.1
Microsoft Windows Vista
Microsoft Windows Server 2012 -
Microsoft Windows Server 2012 R2
Microsoft Windows 10 -
Microsoft Windows 10 1511
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
5
CVSSv2
CVE-2002-0321
Yahoo! Messenger 5.0 allows remote malicious users to spoof other users by modifying the username and using the spoofed username for social engineering or denial of service (flooding) attacks.
Yahoo Messenger 5.0
7.5
CVSSv2
CVE-2001-0162
WinCE 3.0.9348 generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Microsoft Windows Embedded Compact 3.0.9348
1 EDB exploit
7.5
CVSSv2
CVE-2006-7009
Joomla! prior to 1.0.10 allows remote malicious users to spoof the frontend submission forms, which has unknown impact and attack vectors.
Joomla Joomla 1.0.4
Joomla Joomla 1.0.5
Joomla Joomla 1.0.6
Joomla Joomla 1.0.7
Joomla Joomla 1.0.0
Joomla Joomla 1.0.2
Joomla Joomla 1.0.9
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.8
2.6
CVSSv2
CVE-2016-7209
Microsoft Edge allows remote malicious users to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."
Microsoft Edge
4.3
CVSSv2
CVE-2022-30738
Improper check in Loader in Samsung Internet before 17.0.1.69 allows malicious users to spoof address bar via executing script.
Samsung Internet
5
CVSSv2
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
5
CVSSv2
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.0
Apple Safari 1.1
1 EDB exploit
4.3
CVSSv2
CVE-2011-3907
The view-source feature in Google Chrome prior to 16.0.912.63 allows remote malicious users to spoof the URL bar via unspecified vectors.
Google Chrome
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-24955
man-in-the-middle
dos
CVE-2024-2818
CVE-2024-30584
CVE-2024-31134
camera
CVE-2023-45866
CVE-2024-30585
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »