CVE-2006-6971

Mozilla Firefox 2.0, possibly only when running on Windows, allows remote attackers to bypass the Phishing Protection mechanism by representing an IP address in (1) dotted-hex, (2) dotted-octal, (3) single decimal integer, (4) single hex integer, or (5) single octal integer format, which is not captured by the blacklist filter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:24

Type Values Removed Values Added
References () http://sla.ckers.org/forum/read.php?13%2C2253 - () http://sla.ckers.org/forum/read.php?13%2C2253 -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=356355 - Exploit () https://bugzilla.mozilla.org/show_bug.cgi?id=356355 - Exploit

07 Nov 2023, 01:59

Type Values Removed Values Added
References
  • {'url': 'http://sla.ckers.org/forum/read.php?13,2253', 'name': 'http://sla.ckers.org/forum/read.php?13,2253', 'tags': ['Exploit'], 'refsource': 'MISC'}
  • () http://sla.ckers.org/forum/read.php?13%2C2253 -

Information

Published : 2007-02-07 11:28

Updated : 2024-11-21 00:24


NVD link : CVE-2006-6971

Mitre link : CVE-2006-6971

CVE.ORG link : CVE-2006-6971


JSON object : View

Products Affected

mozilla

  • firefox
CWE
CWE-20

Improper Input Validation