Mozilla Firefox 2.0, possibly only when running on Windows, allows remote attackers to bypass the Phishing Protection mechanism by representing an IP address in (1) dotted-hex, (2) dotted-octal, (3) single decimal integer, (4) single hex integer, or (5) single octal integer format, which is not captured by the blacklist filter.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T20:03:11.374Z
Reserved: 2007-02-07T00:00:00Z
Link: CVE-2006-6971

No data.

Status : Modified
Published: 2007-02-07T11:28:00.000
Modified: 2024-11-21T00:24:04.840
Link: CVE-2006-6971

No data.