Skip to content
Threat Feed

Tag

Spoofing

6 briefs RSS
high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
high advisory

Multiple Vulnerabilities in Microsoft Developer Tools

Multiple vulnerabilities in Microsoft Visual Studio, .NET Framework, .NET, PowerShell, and Visual Studio Code can be exploited by an attacker to disclose sensitive information, conduct spoofing attacks, cause a denial of service, or bypass security measures, potentially leading to arbitrary code execution.

vulnerability code-execution spoofing denial-of-service information-disclosure windows
2r 4t
medium advisory

CVE-2026-26149 Microsoft Power Apps Spoofing Vulnerability

A spoofing vulnerability exists in Microsoft Power Apps, identified as CVE-2026-26149, potentially allowing an attacker to mislead users or gain unauthorized access.

CVE-2026-26149 powerapps spoofing
2r 1c
medium advisory

Windows Remote Desktop Spoofing Vulnerability (CVE-2026-26151)

CVE-2026-26151 is a spoofing vulnerability in Windows Remote Desktop due to an insufficient UI warning for dangerous operations, allowing an unauthorized attacker to perform spoofing over a network.

cve-2026-26151 rdp spoofing windows
2r 2t 1c
medium advisory

.NET Spoofing Vulnerability (CVE-2026-32178)

CVE-2026-32178 is a vulnerability in .NET that allows for network spoofing due to improper neutralization of special elements, potentially enabling attackers to impersonate legitimate entities.

dotnet spoofing cve-2026-32178
2r 1t 1c 2i
high advisory

Potential Kerberos Coercion via DNS-Based SPN Spoofing

Adversaries may abuse MicrosoftDNS records containing a base64-encoded blob to coerce victim systems into authenticating to attacker-controlled hosts while requesting Kerberos tickets for legitimate services, detected via directory-service access events.

Active Directory kerberos coercion dns spn spoofing credential-access
2r 1t