Логотип exploitDog
bind:CVE-2022-3033
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3033

Количество 12

Количество 12

ubuntu логотип

CVE-2022-3033

почти 3 года назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
EPSS: Низкий
redhat логотип

CVE-2022-3033

около 3 лет назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2022-3033

почти 3 года назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2022-3033

почти 3 года назад

If a Thunderbird user replied to a crafted HTML email containing a <co ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-q68w-fq74-6jp9

почти 3 года назад

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2022-05444

около 3 лет назад

Уязвимость почтового клиента Thunderbird, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 9.8
EPSS: Низкий
rocky логотип

RLSA-2022:6708

около 3 лет назад

Important: thunderbird security update

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6717

около 3 лет назад

ELSA-2022-6717: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6710

около 3 лет назад

ELSA-2022-6710: thunderbird security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2022-6708

около 3 лет назад

ELSA-2022-6708: thunderbird security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:3281-1

около 3 лет назад

Security update for MozillaThunderbird

EPSS: Низкий
redos логотип

ROS-20221007-04

около 3 лет назад

Множественные уязвимости thunderbird

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 7.5
0%
Низкий
около 3 лет назад
nvd логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in

CVSS3: 8.1
0%
Низкий
почти 3 года назад
debian логотип
CVE-2022-3033

If a Thunderbird user replied to a crafted HTML email containing a <co ...

CVSS3: 8.1
0%
Низкий
почти 3 года назад
github логотип
GHSA-q68w-fq74-6jp9

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv="refresh"</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified ...

CVSS3: 8.1
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-05444

Уязвимость почтового клиента Thunderbird, связанная с ошибками при обработке входных данных, позволяющая нарушителю выполнить произвольный JavaScript-код

CVSS3: 9.8
0%
Низкий
около 3 лет назад
rocky логотип
RLSA-2022:6708

Important: thunderbird security update

около 3 лет назад
oracle-oval логотип
ELSA-2022-6717

ELSA-2022-6717: thunderbird security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-6710

ELSA-2022-6710: thunderbird security update (IMPORTANT)

около 3 лет назад
oracle-oval логотип
ELSA-2022-6708

ELSA-2022-6708: thunderbird security update (IMPORTANT)

около 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:3281-1

Security update for MozillaThunderbird

около 3 лет назад
redos логотип
ROS-20221007-04

Множественные уязвимости thunderbird

около 3 лет назад

Уязвимостей на страницу