Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
spoof vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0335
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local malicious user to spoof DNS query results.
Gnu Glibc 2.1
Gnu Glibc 2.1.2
Gnu Glibc 2.1.3
Isc Bind 8.2
Isc Bind 8.2.1
Gnu Glibc 2.0
Gnu Glibc 2.1.1
Isc Bind 8.2.2
NA
CVE-2011-1107
Unspecified vulnerability in Google Chrome prior to 9.0.597.107 allows remote malicious users to spoof the URL bar via unknown vectors.
Google Chrome
Apple Safari
Apple Iphone Os
7.5
CVSSv3
CVE-2019-15545
An issue exists in the libp2p-core crate prior to 0.8.1 for Rust. Attackers can spoof ed25519 signatures.
Libp2p Libp2p
NA
CVE-2004-0843
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote malicious users to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
Microsoft Ie 6
Microsoft Internet Explorer 5.5
4.3
CVSSv3
CVE-2022-30738
Improper check in Loader in Samsung Internet before 17.0.1.69 allows malicious users to spoof address bar via executing script.
Samsung Internet
NA
CVE-2001-0162
WinCE 3.0.9348 generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Microsoft Windows Embedded Compact 3.0.9348
1 EDB exploit
5.3
CVSSv3
CVE-2016-7209
Microsoft Edge allows remote malicious users to spoof web content via a crafted web site, aka "Microsoft Edge Spoofing Vulnerability."
Microsoft Edge
NA
CVE-2006-7009
Joomla! prior to 1.0.10 allows remote malicious users to spoof the frontend submission forms, which has unknown impact and attack vectors.
Joomla Joomla 1.0.4
Joomla Joomla 1.0.5
Joomla Joomla 1.0.6
Joomla Joomla 1.0.7
Joomla Joomla 1.0.0
Joomla Joomla 1.0.2
Joomla Joomla 1.0.9
Joomla Joomla 1.0.1
Joomla Joomla 1.0.3
Joomla Joomla 1.0.8
5.9
CVSSv3
CVE-2020-5812
Nessus AMI versions 8.12.0 and previous versions were found to either not validate, or incorrectly validate, a certificate which could allow an malicious user to spoof a trusted entity by using a man-in-the-middle (MITM) attack.
Tenable Nessus Amazon Machine Image
NA
CVE-2014-0364
The ParseRoster component in the Ignite Realtime Smack XMPP API prior to 4.0.0-rc1 does not verify the from attribute of a roster-query IQ stanza, which allows remote malicious users to spoof IQ responses via a crafted attribute.
Igniterealtime Smack
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2108
CVE-2024-31061
CVE-2024-25959
CVE-2023-45866
injection
IDOR
memory leak
CVE-2024-1086
CVE-2023-42931
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »