Vulnerability Name: | CCN-25983 | ||||||
Published: | 2006-04-21 | ||||||
Updated: | 2006-04-21 | ||||||
Summary: | Multiple Mozilla products, including Thunderbird, Mozilla Suite and SeaMonkey, could allow a remote attacker to execute malicious JavaScript on a victim's system. A remote attacker could exploit this vulnerability if a victim uses the default HTML "rich mail" editor when forwarding in-line mail to execute JavaScript in the victim's mail client with privileges of the victim, allowing the attacker to perform malicious actions on the victim's system or use their email client to send spam. | ||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: MFSA 2006-21 JavaScript execution in mail when forwarding in-line Source: CCN Type: BID-17516 Mozilla Suite, Firefox, SeaMonkey, and Thunderbird Multiple Remote Vulnerabilities Source: XF Type: UNKNOWN mozilla-inline-fwd-code-execution(25983) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |