Skip to content
appaloosa scout logo main rounded
N/A

CVE-2006-0884

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

EPSS 36.0% percentile 97.1%

Affected tracked apps

Vulnerable CPE configurations

Vendor Product Platform Versions CPE 2.3 URI
mozilla thunderbird Windows ≤1.0.7 cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*
mozilla thunderbird Windows cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*
View on NVD ↗