CVE-2006-0884
Mozilla Thunderbird < 1.0.7 - Improper Input Validation
Title source: ruleDescription
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Georgi Guninski · htmldoslinux
https://www.exploit-db.com/exploits/27257
References (41)
... and 21 more
Scores
EPSS
0.3600
EPSS Percentile
97.1%
Details
CWE
CWE-20
Status
published
Products (18)
mozilla/thunderbird
0.1
mozilla/thunderbird
0.2
mozilla/thunderbird
0.3
mozilla/thunderbird
0.4
mozilla/thunderbird
0.5
mozilla/thunderbird
0.6
mozilla/thunderbird
0.7
mozilla/thunderbird
0.7.1
mozilla/thunderbird
0.7.2
mozilla/thunderbird
0.7.3
... and 8 more
Published
Feb 24, 2006
Tracked Since
Feb 18, 2026