CVE-2007-0802

N/A Unknown
Published: February 07, 2007 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the "." and "/" characters, which is not caught by the Phishing List blacklist filter.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/33705
Source: cve@mitre.org
Broken Link
http://www.securityfocus.com/archive/1/459265/100/0/threaded
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=367538
Source: cve@mitre.org
Issue Tracking Third Party Advisory
http://archives.neohapsis.com/archives/fulldisclosure/2007-04/0516.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://kaneda.bohater.net/security/20070111-firefox_2.0.0.1_bypass_phishing_protection.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Vendor Advisory
http://osvdb.org/33705
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/459265/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=367538
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory

10 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

opera mozilla