cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2011-3389,https://securityvulnerability.io/vulnerability/CVE-2011-3389,,"The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a ""BEAST"" attack.",Opera,"Opera Browser,Internet Explorer,Windows,Chrome,Firefox",,,0.014329999685287476,false,,false,false,true,2015-03-28T10:28:16.000Z,true,false,false,,2011-09-06T19:00:00.000Z,0 CVE-2007-0802,https://securityvulnerability.io/vulnerability/CVE-2007-0802,,"Mozilla Firefox 2.0.0.1 allows remote attackers to bypass the Phishing Protection mechanism by adding certain characters to the end of the domain name, as demonstrated by the ""."" and ""/"" characters, which is not caught by the Phishing List blacklist filter.",Opera,"Opera Browser,Firefox",,,0.00471000000834465,false,,false,false,false,,,false,false,,2007-02-07T11:00:00.000Z,0 CVE-2005-0233,https://securityvulnerability.io/vulnerability/CVE-2005-0233,,"The International Domain Name (IDN) support in Firefox 1.0, Camino .8.5, and Mozilla before 1.7.6 allows remote attackers to spoof domain names using punycode encoded domain names that are decoded in URLs and SSL certificates in a way that uses homograph characters from other character sets, which facilitates phishing attacks.",Opera Software,"Opera Web Browser,Firefox,Camino,Omniweb,Opera Browser,Mozilla",,,0.7219700217247009,false,,false,false,false,,,false,false,,2005-02-08T05:00:00.000Z,0