Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-3907
The view-source feature in Google Chrome prior to 16.0.912.63 allows remote malicious users to spoof the URL bar via unspecified vectors.
Google Chrome
4.3
CVSSv2
CVE-2013-5152
Mobile Safari in Apple iOS prior to 7 allows remote malicious users to spoof the URL bar via a crafted web site.
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 6.1.2
Apple Iphone Os 6.1.3
5
CVSSv2
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.0
Apple Safari 1.1
1 EDB exploit
7.5
CVSSv2
CVE-2000-0178
ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Foundrynet Serveriron 5.1.10t12
Foundrynet Serveriron 6.0
5.8
CVSSv2
CVE-2011-4092
obby (aka libobby) does not verify SSL server certificates, which allows remote malicious users to spoof servers via an arbitrary certificate.
Ubuntu Developers Obby -
5
CVSSv2
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
5
CVSSv2
CVE-2018-9024
An improper authentication vulnerability in CA Privileged Access Manager 2.x allows malicious users to spoof IP addresses in a log file.
Broadcom Privileged Access Manager
5
CVSSv2
CVE-2005-0831
PHP-Post allows remote malicious users to spoof the names of other users by registering with a username containing hex-encoded characters.
Php-post Php-post Web Forum 0.1
Php-post Php-post Web Forum 0.2
Php-post Php-post Web Forum 0.21
Php-post Php-post Web Forum 0.22
Php-post Php-post Web Forum 0.3
Php-post Php-post Web Forum 0.32
4.3
CVSSv2
CVE-2017-9475
Comcast XFINITY WiFi Home Hotspot devices allow remote malicious users to spoof the identities of Comcast customers via a forged MAC address.
Comcast Xfinity Wifi Hotspot -
2.1
CVSSv2
CVE-2004-2658
resmgr in SUSE CORE 9 does not properly identify terminal names, which allows local users to spoof terminals and login types.
Suse Suse Linux 9.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »