Логотип exploitDog
bind:"BDU:2022-05444" OR bind:"CVE-2022-3033"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-05444" OR bind:"CVE-2022-3033"

Количество 12

Количество 12

fstec логотип

BDU:2022-05444

почти 3 года назад

Уязвимость почтового клиента Thunderbird, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2022-3033

больше 2 лет назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2022-3033

почти 3 года назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-3033

больше 2 лет назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2022-3033

больше 2 лет назад

If a Thunderbird user replied to a crafted HTML email containing a <co ...

CVSS3: 8.1
EPSS: Низкий
redos логотип

ROS-20221007-04

больше 2 лет назад

Множественные уязвимости thunderbird

EPSS: Низкий
github логотип

GHSA-q68w-fq74-6jp9

больше 2 лет назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
EPSS: Низкий
rocky логотип

RLSA-2022:6708

больше 2 лет назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6717

больше 2 лет назад

ELSA-2022-6717: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6710

больше 2 лет назад

ELSA-2022-6710: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6708

больше 2 лет назад

ELSA-2022-6708: thunderbird security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3281-1

почти 3 года назад

Security update for MozillaThunderbird

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-05444

Уязвимость почтового клиента Thunderbird, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 9.8
0%
Низкий
почти 3 года назад
ubuntu логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 7.5
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <co ...

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
redos логотип
ROS-20221007-04

Множественные уязвимости thunderbird

больше 2 лет назад
github логотип
GHSA-q68w-fq74-6jp9

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
rocky логотип
RLSA-2022:6708

Important: thunderbird security update

больше 2 лет назад
oracle-oval логотип
ELSA-2022-6717

ELSA-2022-6717: thunderbird security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2022-6710

ELSA-2022-6710: thunderbird security update (IMPORTANT)

больше 2 лет назад
oracle-oval логотип
ELSA-2022-6708

ELSA-2022-6708: thunderbird security update (IMPORTANT)

больше 2 лет назад
suse-cvrf логотип
SUSE-SU-2022:3281-1

Security update for MozillaThunderbird

почти 3 года назад

Уязвимостей на страницу