Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-3907
The view-source feature in Google Chrome prior to 16.0.912.63 allows remote malicious users to spoof the URL bar via unspecified vectors.
Google Chrome
NA
CVE-2013-5152
Mobile Safari in Apple iOS prior to 7 allows remote malicious users to spoof the URL bar via a crafted web site.
Apple Iphone Os 1.1.0
Apple Iphone Os 1.1.1
Apple Iphone Os 1.1.2
Apple Iphone Os 1.1.3
Apple Iphone Os 3.1.2
Apple Iphone Os 3.1.3
Apple Iphone Os 3.2
Apple Iphone Os 3.2.1
Apple Iphone Os 4.3.5
Apple Iphone Os 5.0
Apple Iphone Os 5.0.1
Apple Iphone Os 5.1
Apple Iphone Os 2.0.1
Apple Iphone Os 2.0.2
Apple Iphone Os 2.1
Apple Iphone Os 2.1.1
Apple Iphone Os 4.1
Apple Iphone Os 4.2.1
Apple Iphone Os 4.2.5
Apple Iphone Os 4.2.8
Apple Iphone Os 6.1.2
Apple Iphone Os 6.1.3
NA
CVE-2004-1121
Apple Safari 1.0 up to and including 1.2.3 allows remote malicious users to spoof the URL displayed in the status bar via TABLE tags.
Apple Safari 1.2.2
Apple Safari 1.2.3
Apple Safari 1.2
Apple Safari 1.2.1
Apple Safari 1.0
Apple Safari 1.1
1 EDB exploit
NA
CVE-2000-0178
ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote malicious users to spoof or hijack sessions.
Foundrynet Serveriron 5.1.10t12
Foundrynet Serveriron 6.0
NA
CVE-2011-4092
obby (aka libobby) does not verify SSL server certificates, which allows remote malicious users to spoof servers via an arbitrary certificate.
Ubuntu Developers Obby -
NA
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
5.3
CVSSv3
CVE-2018-9024
An improper authentication vulnerability in CA Privileged Access Manager 2.x allows malicious users to spoof IP addresses in a log file.
Broadcom Privileged Access Manager
NA
CVE-2005-0831
PHP-Post allows remote malicious users to spoof the names of other users by registering with a username containing hex-encoded characters.
Php-post Php-post Web Forum 0.1
Php-post Php-post Web Forum 0.2
Php-post Php-post Web Forum 0.21
Php-post Php-post Web Forum 0.22
Php-post Php-post Web Forum 0.3
Php-post Php-post Web Forum 0.32
5.9
CVSSv3
CVE-2017-9475
Comcast XFINITY WiFi Home Hotspot devices allow remote malicious users to spoof the identities of Comcast customers via a forged MAC address.
Comcast Xfinity Wifi Hotspot -
NA
CVE-2004-2658
resmgr in SUSE CORE 9 does not properly identify terminal names, which allows local users to spoof terminals and login types.
Suse Suse Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
race condition
CVE-2024-4249
CVE-2024-4244
CVE-2023-20198
TCP
CVE-2022-48648
CVE-2022-48636
CVE-2024-21345
SQL
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »