Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2006-0884

EPSS 36.00% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2006-0884

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The WYSIWYG rendering engine ("rich mail" editor) in Mozilla Thunderbird 1.0.7 and earlier allows user-assisted attackers to bypass javascript security settings and obtain sensitive information or cause a crash via an e-mail containing a javascript URI in the SRC attribute of an IFRAME tag, which is executed when the user edits the e-mail.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mozilla Thunderbird IFRAME JavaScript执行及拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Thunderbird是一款功能强大的邮件客户端,支持IMAP和POP邮件协议及HTML邮件格式。 Thunderbird对HTML格式邮件的处理上存在问题,远程攻击者可能利用此漏洞在客户端机器上执行恶意脚本代码。 Thunderbird的WYSIWYG渲染引擎没有充分地过滤JavaScript脚本,允许向IFRAME标签的SRC属性中写入JavaScript。这可能导致即使禁用了JavaScript的话,在用户编辑邮件或回复邮件时也可执行脚本或导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2006-0884

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2006-0884

Please Login to view more intelligence information

Same Patch Batch · n/a · 2006-02-24 · 21 CVEs total

CVE-2006-0879Noah's Classifieds 搜索工具SQL注入漏洞
CVE-2006-0377SquirrelMail IMAP/SMTP命令注入漏洞
CVE-2006-0300GNU tar工具无效头部结构缓冲区溢出漏洞
CVE-2006-0195SquirrelMail IMAP/SMTP命令注入漏洞
CVE-2006-0188SquirrelMail IMAP/SMTP命令注入漏洞
CVE-2005-3630Fedora目录服务器口令信息泄露漏洞
CVE-2005-2934SCO UnixWare ptrace()本地权限提升漏洞
CVE-2006-0882Noah's Classifieds本‘include.php’目录遍历漏洞
CVE-2006-0881Noah's Classifieds ‘gorum/gorumlib.php’PHP远程文件包含漏洞
CVE-2006-0880Noah's Classifieds Index.PHP多个跨站脚本攻击漏洞
CVE-2004-2654Squid Web Proxy Cache服务拒绝漏洞
CVE-2006-0878Noah's Classifieds 直接请求远程文件包含漏洞
CVE-2006-0877Easy Forum 跨站脚本攻击漏洞
CVE-2006-0876POPFile拒绝服务漏洞
CVE-2006-0875RunCMS Ratefile.PHP跨站脚本攻击漏洞
CVE-2006-0874Intensive Point iUser Ecommerce未明漏洞
CVE-2006-0873Coppermine Photo Gallery远程代码注入漏洞
CVE-2006-0872Coppermine Photo Gallery远程代码注入漏洞
CVE-2006-0871Mambo Open Source 多个SQL注入漏洞
CVE-2006-0813Winace ARJ堆缓冲区溢出漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2006-0884

No comments yet


Leave a comment