CVE-2006-0884

Mozilla Thunderbird < 1.0.7 - Improper Input Validation

Title source: rule

Description

The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Georgi Guninski · htmldoslinux
https://www.exploit-db.com/exploits/27257

Scores

EPSS 0.3600
EPSS Percentile 97.1%

Details

CWE
CWE-20
Status published
Products (18)
mozilla/thunderbird 0.1
mozilla/thunderbird 0.2
mozilla/thunderbird 0.3
mozilla/thunderbird 0.4
mozilla/thunderbird 0.5
mozilla/thunderbird 0.6
mozilla/thunderbird 0.7
mozilla/thunderbird 0.7.1
mozilla/thunderbird 0.7.2
mozilla/thunderbird 0.7.3
... and 8 more
Published Feb 24, 2006
Tracked Since Feb 18, 2026