CVE-2007-0802

Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the "." and "/" characters, which is not caught by the Phishing List blacklist filter.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*

History

21 Nov 2024, 00:26

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html - Broken Link () http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html - Broken Link
References () http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php - Broken Link, Exploit, Vendor Advisory () http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php - Broken Link, Exploit, Vendor Advisory
References () http://osvdb.org/33705 - Broken Link () http://osvdb.org/33705 - Broken Link
References () http://www.securityfocus.com/archive/1/459265/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/459265/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=367538 - Issue Tracking, Third Party Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=367538 - Issue Tracking, Third Party Advisory

26 Feb 2022, 04:06

Type Values Removed Values Added
References (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=367538 - (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=367538 - Issue Tracking, Third Party Advisory
References (OSVDB) http://osvdb.org/33705 - (OSVDB) http://osvdb.org/33705 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/459265/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/459265/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (MISC) http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php - Exploit, Vendor Advisory (MISC) http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php - Broken Link, Exploit, Vendor Advisory
References (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html - (FULLDISC) http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html - Broken Link
CPE cpe:2.3:a:opera_software:opera:9.10:*:*:*:*:*:*:* cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*
CWE CWE-264 CWE-20

Information

Published : 2007-02-07 11:28

Updated : 2024-11-21 00:26


NVD link : CVE-2007-0802

Mitre link : CVE-2007-0802

CVE.ORG link : CVE-2007-0802


JSON object : View

Products Affected

opera

  • opera_browser

mozilla

  • firefox
CWE
CWE-20

Improper Input Validation