Логотип exploitDog
bind:CVE-2006-0884
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2006-0884

Количество 5

Количество 5

ubuntu логотип

CVE-2006-0884

больше 19 лет назад

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

CVSS2: 9.3
EPSS: Средний
redhat логотип

CVE-2006-0884

больше 19 лет назад

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

EPSS: Средний
nvd логотип

CVE-2006-0884

больше 19 лет назад

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

CVSS2: 9.3
EPSS: Средний
debian логотип

CVE-2006-0884

больше 19 лет назад

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbi ...

CVSS2: 9.3
EPSS: Средний
github логотип

GHSA-f48c-g7r5-vhv8

больше 3 лет назад

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2006-0884

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

CVSS2: 9.3
36%
Средний
больше 19 лет назад
redhat логотип
CVE-2006-0884

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

36%
Средний
больше 19 лет назад
nvd логотип
CVE-2006-0884

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

CVSS2: 9.3
36%
Средний
больше 19 лет назад
debian логотип
CVE-2006-0884

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbi ...

CVSS2: 9.3
36%
Средний
больше 19 лет назад
github логотип
GHSA-f48c-g7r5-vhv8

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

36%
Средний
больше 3 лет назад

Уязвимостей на страницу