Vulnerabilities (CVE)

Filtered by CWE-451
Total 73 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-34479 2 Linux, Mozilla 4 Linux Kernel, Firefox, Firefox Esr and 1 more 2025-04-15 N/A 6.5 MEDIUM
A malicious website that could create a popup could have resized the popup to overlay the address bar with its own content, resulting in potential user confusion or spoofing attacks. <br>*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
CVE-2022-45404 1 Mozilla 3 Firefox, Firefox Esr, Thunderbird 2025-04-15 N/A 6.5 MEDIUM
Through a series of popup and <code>window.print()</code> calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
CVE-2025-32371 2025-04-09 N/A 4.3 MEDIUM
DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. A url could be crafted to the DNN ImageHandler to render text from a querystring parameter. This text would display in the resulting image and a user that trusts the domain might think that the information is legitimate. This vulnerability is fixed in 9.13.4.
CVE-2025-0451 1 Google 1 Chrome 2025-04-08 N/A 6.3 MEDIUM
Inappropriate implementation in Extensions API in Google Chrome prior to 133.0.6943.53 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium)
CVE-2025-29796 2025-04-07 N/A 4.7 MEDIUM
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.
CVE-2025-30467 1 Apple 4 Ipados, Iphone Os, Macos and 1 more 2025-04-04 N/A 4.3 MEDIUM
The issue was addressed with improved checks. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4. Visiting a malicious website may lead to address bar spoofing.
CVE-2025-1922 1 Google 2 Android, Chrome 2025-04-01 N/A 4.3 MEDIUM
Inappropriate implementation in Selection in Google Chrome on Android prior to 134.0.6998.35 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-2631 2 Fedoraproject, Google 2 Fedora, Chrome 2025-03-29 N/A 4.3 MEDIUM
Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-4950 2 Fedoraproject, Google 2 Fedora, Chrome 2025-03-28 N/A 6.5 MEDIUM
Inappropriate implementation in Downloads in Google Chrome prior to 125.0.6422.60 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-54558 1 Apple 3 Ipados, Iphone Os, Macos 2025-03-27 N/A 2.8 LOW
A clickjacking issue was addressed with improved out-of-process view handling. This issue is fixed in iOS 18 and iPadOS 18, macOS Sequoia 15. An app may be able to trick a user into granting access to photos from the user's photo library.
CVE-2023-0700 1 Google 1 Chrome 2025-03-20 N/A 6.5 MEDIUM
Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
CVE-2023-0130 1 Google 2 Android, Chrome 2025-03-20 N/A 6.5 MEDIUM
Inappropriate implementation in in Fullscreen API in Google Chrome on Android prior to 109.0.5414.74 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-6610 1 Mozilla 2 Firefox, Thunderbird 2025-03-18 N/A 4.3 MEDIUM
Form validation popups could capture escape key presses. Therefore, spamming form validation messages could be used to prevent users from exiting full-screen mode. This vulnerability affects Firefox < 128 and Thunderbird < 128.
CVE-2023-2938 1 Google 1 Chrome 2025-03-18 N/A 4.3 MEDIUM
Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-8909 2 Apple, Google 2 Iphone Os, Chrome 2025-03-17 N/A 4.3 MEDIUM
Inappropriate implementation in UI in Google Chrome on iOS prior to 129.0.6668.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
CVE-2024-38313 1 Mozilla 1 Firefox 2025-03-14 N/A 4.3 MEDIUM
In certain scenarios a malicious website could attempt to display a fake location URL bar which could mislead users as to the actual website address This vulnerability affects Firefox for iOS < 127.
CVE-2024-6999 1 Google 1 Chrome 2025-03-14 N/A 4.3 MEDIUM
Inappropriate implementation in FedCM in Google Chrome prior to 127.0.6533.72 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
CVE-2024-5698 1 Mozilla 1 Firefox 2025-03-14 N/A 6.1 MEDIUM
By manipulating the fullscreen feature while opening a data-list, an attacker could have overlaid a text box over the address bar. This could have led to user confusion and possible spoofing attacks. This vulnerability affects Firefox < 127.
CVE-2023-2937 1 Google 1 Chrome 2025-03-11 N/A 4.3 MEDIUM
Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
CVE-2023-2941 1 Google 1 Chrome 2025-03-11 N/A 4.3 MEDIUM
Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)