The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
2006-02-24T22:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 9.3 (HIGH)
AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | mozilla | thunderbird | ≤ 1.0.7 | Yes |
Application | mozilla | thunderbird | 0.1 | Yes |
Application | mozilla | thunderbird | 0.2 | Yes |
Application | mozilla | thunderbird | 0.3 | Yes |
Application | mozilla | thunderbird | 0.4 | Yes |
Application | mozilla | thunderbird | 0.5 | Yes |
Application | mozilla | thunderbird | 0.6 | Yes |
Application | mozilla | thunderbird | 0.7 | Yes |
Application | mozilla | thunderbird | 0.7.1 | Yes |
Application | mozilla | thunderbird | 0.7.2 | Yes |
Application | mozilla | thunderbird | 0.7.3 | Yes |
Application | mozilla | thunderbird | 0.8 | Yes |
Application | mozilla | thunderbird | 0.9 | Yes |
Application | mozilla | thunderbird | 1.0 | Yes |
Application | mozilla | thunderbird | 1.0.1 | Yes |
Application | mozilla | thunderbird | 1.0.2 | Yes |
Application | mozilla | thunderbird | 1.0.5 | Yes |
Application | mozilla | thunderbird | 1.0.6 | Yes |