This repository has been archived by the owner on May 10, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 348
Address bar spoofing #2642
Comments
It doesn't get "spoofed", it actually loads |
I see, so are we going for a fix for this. |
Le 2018-04-23 à 05:02, Dhiraj Mishra a écrit :
I see, so are we going for a fix for this.
umm ... anyone who loads that page on ANY browser will see exactly the
same thing.
The only 'fix' would be to not open that page.
Or at least to not follow the link it presents.
(Like looking at the adress of the link before following it. Readily
done with Qupzilla/Falkon and most other browsers.)
…--
André
|
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hi Team,
A security issue was observed while performing bulk test-cases on
qupzilla browser
.Steps to reproduce the issue:
spoof.html
The Omini bar get spoofed, to
https://www.account.google.com/
such attack will help attacker to perform attacks such as phishing.spoof.html
Request team, to please have a look.
Thank you!
The text was updated successfully, but these errors were encountered: