Vulnerability Name: | CCN-35794 | ||||||
Published: | 2007-08-03 | ||||||
Updated: | 2007-08-03 | ||||||
Summary: | Mozilla Firefox could allow a remote attacker to spoof the URL in the address bar. By persuading a victim to visit a specially-crafted Web site containing a malicious document.location value, an attacker could exploit this vulnerability to spoof URLs and possibly perform phishing attacks. | ||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N) 2.4 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Fri Aug 03 2007 - 10:48:07 CDT Firefox 2.0.0.6 Encoded URI Statusbar Spooing Vulnerability Source: CCN Type: Mozilla Firefox Web site Mozilla - Home of the Firefox web browser and Thunderbird email client Source: CCN Type: BID-25196 Mozilla Firefox Encoded Status Bar Spoofing Weakness Source: XF Type: UNKNOWN firefox-documentlocation-url-spoofing(35794) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |