Total vulnerabilities in the database
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Software | From | Fixed in |
---|---|---|
mozilla / thunderbird | 0.6 | 0.6.x |
mozilla / thunderbird | 0.7.2 | 0.7.2.x |
mozilla / thunderbird | 0.3 | 0.3.x |
mozilla / thunderbird | 0.2 | 0.2.x |
mozilla / thunderbird | 1.0 | 1.0.x |
mozilla / thunderbird | 1.0.1 | 1.0.1.x |
mozilla / thunderbird | 1.0.2 | 1.0.2.x |
mozilla / thunderbird | 0.5 | 0.5.x |
mozilla / thunderbird | 0.9 | 0.9.x |
mozilla / thunderbird | 0.7.3 | 0.7.3.x |
mozilla / thunderbird | 0.4 | 0.4.x |
mozilla / thunderbird | 0.7 | 0.7.x |
mozilla / thunderbird | 1.0.6 | 1.0.6.x |
mozilla / thunderbird | 0.1 | 0.1.x |
mozilla / thunderbird | 0.7.1 | 0.7.1.x |
mozilla / thunderbird | - | 1.0.7.x |
mozilla / thunderbird | 1.0.5 | 1.0.5.x |
mozilla / thunderbird | 0.8 | 0.8.x |