Mozilla Firefox 2.0, possibly only when running on Windows, allows remote attackers to bypass the Phishing Protection mechanism by representing an IP address in (1) dotted-hex, (2) dotted-octal, (3) single decimal integer, (4) single hex integer, or (5) single octal integer format, which is not captured by the blacklist filter.
References
Configurations
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://sla.ckers.org/forum/read.php?13%2C2253 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=356355 - Exploit |
07 Nov 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2007-02-07 11:28
Updated : 2024-11-21 00:24
NVD link : CVE-2006-6971
Mitre link : CVE-2006-6971
CVE.ORG link : CVE-2006-6971
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-20
Improper Input Validation