Total
420 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-28478 | 1 Microsoft | 2 Sharepoint Foundation, Sharepoint Server | 2025-02-28 | 7.6 High |
Microsoft SharePoint Server Spoofing Vulnerability | ||||
CVE-2021-26418 | 1 Microsoft | 2 Sharepoint Foundation, Sharepoint Server | 2025-02-28 | 4.6 Medium |
Microsoft SharePoint Server Spoofing Vulnerability | ||||
CVE-2023-38173 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 4.3 Medium |
Microsoft Edge for Android Spoofing Vulnerability | ||||
CVE-2023-36883 | 1 Microsoft | 1 Edge | 2025-02-28 | 4.3 Medium |
Microsoft Edge for iOS Spoofing Vulnerability | ||||
CVE-2023-36769 | 1 Microsoft | 1 Onenote | 2025-02-28 | 4.6 Medium |
Microsoft OneNote Spoofing Vulnerability | ||||
CVE-2023-35392 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 4.7 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2023-29334 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2023-24935 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 6.1 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2023-24892 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 8.2 High |
Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability | ||||
CVE-2023-21794 | 1 Microsoft | 1 Edge Chromium | 2025-02-28 | 4.3 Medium |
Microsoft Edge (Chromium-based) Spoofing Vulnerability | ||||
CVE-2021-31209 | 1 Microsoft | 1 Exchange Server | 2025-02-28 | 6.5 Medium |
Microsoft Exchange Server Spoofing Vulnerability | ||||
CVE-2021-31195 | 1 Microsoft | 1 Exchange Server | 2025-02-28 | 6.5 Medium |
Microsoft Exchange Server Remote Code Execution Vulnerability | ||||
CVE-2022-48349 | 1 Huawei | 2 Emui, Harmonyos | 2025-02-24 | 9.1 Critical |
The control component has a spoofing vulnerability. Successful exploitation of this vulnerability may affect confidentiality and availability. | ||||
CVE-2023-51327 | 2025-02-21 | 6.5 Medium | ||
A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | ||||
CVE-2023-51326 | 2025-02-21 | 6.5 Medium | ||
A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | ||||
CVE-2023-51323 | 2025-02-21 | 6.5 Medium | ||
A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Shared Asset Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | ||||
CVE-2023-51321 | 2025-02-21 | 6.5 Medium | ||
A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Night Club Booking Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages. | ||||
CVE-2020-6158 | 2025-02-21 | 4.7 Medium | ||
Opera Mini for Android before version 52.2 is vulnerable to an address bar spoofing attack. The vulnerability allows a malicious page to trick the browser into showing an address of a different page. This may allow the malicious page to impersonate another page and trick a user into providing sensitive data. | ||||
CVE-2023-0816 | 1 Strategy11 | 1 Formidable Form Builder | 2025-02-19 | 6.5 Medium |
The Formidable Forms WordPress plugin before 6.1 uses several potentially untrusted headers to determine the IP address of the client, leading to IP Address spoofing and bypass of anti-spam protections. | ||||
CVE-2025-25055 | 2025-02-18 | N/A | ||
Authentication bypass by spoofing issue exists in FileMegane versions above 1.0.0.0 prior to 3.4.0.0, which may lead to user impersonation. If exploited, restricted file contents may be accessed. |