ui spoofing

  1. CVE-2025-9865: Chrome 140 Fixes Android UI Toolbar Spoofing

    Google's Chromium team has fixed a medium-severity UI spoofing flaw—tracked as CVE-2025-9865—that existed in the browser's Toolbar implementation and could allow domain spoofing on Android when a user performed specific UI gestures on crafted pages. Background Chromium's September 2025 security...
  2. CVE-2025-9867: Chrome Android Downloads UI Spoofing Fixed in Chrome 140

    Google and the Chromium project have patched CVE-2025-9867, a medium-severity inappropriate implementation bug in the Downloads component that can be abused for UI spoofing on Chrome for Android, and users should update their mobile and desktop Chromium-based browsers immediately to eliminate...
  3. CVE-2025-49736: Edge for Android UI Spoofing — Impact & Patch Guide

    CVE-2025-49736 — Microsoft Edge (Chromium) for Android: UI‑spoofing / “UI performs the wrong action” vulnerability A deep-dive explainer, impact assessment, and practical mitigation checklist Summary Microsoft’s Security Update Guide lists CVE‑2025‑49736 as affecting Microsoft Edge...
  4. Edge on Android CVE-2025-49755: UI Spoofing Risk and Mitigation

    Microsoft’s Security Response Center has published an advisory for CVE-2025-49755, a user‑interface (UI) misrepresentation — spoofing — vulnerability affecting Microsoft Edge (Chromium‑based) on Android devices, a flaw that allows a remote attacker to present misleading or falsified UI elements...
  5. Windows Security App Spoofing Flaw (CVE-2025-47956): Mitigation Guide

    Microsoft security telemetry and third‑party trackers identify a newly disclosed spoofing flaw in the Windows Security App that lets a locally authorized user manipulate file names or paths and present forged or misleading security UI and alerts — a vulnerability cataloged publicly under the...
  6. Google Chrome Security Update: Fix for CVE-2025-8583 UI Spoofing Vulnerability

    A recent security vulnerability, identified as CVE-2025-8583, has been discovered in Google Chrome's permissions implementation. This flaw allows remote attackers to perform user interface (UI) spoofing through specially crafted HTML pages. Google has addressed this issue in Chrome version...