Vulnerability Name: | CVE-2004-2226 (CCN-17949) | ||||||||
Assigned: | 2004-11-02 | ||||||||
Published: | 2004-11-02 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Mozilla Mail 1.7.1 and 1.7.3, and Thunderbird before 0.9, when HTML-Mails is enabled, allows remote attackers to determine valid e-mail addresses via an HTML e-mail that references a Cascading Style Sheets (CSS) document on the attacker's server. | ||||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Tue Nov 02 2004 - 19:28:30 CST CSS in E-Mails possible E-Mail-Validity Check for Spammers? Source: FULLDISC Type: UNKNOWN 20041102 CSS in E-Mails possible E-Mail-Validity Check for Spammers? Source: MITRE Type: CNA CVE-2004-2226 Source: CCN Type: SA13086 Mozilla / Thunderbird Valid Email Address Enumeration Weakness Source: SECUNIA Type: Patch, Vendor Advisory 13086 Source: OSVDB Type: Patch 11394 Source: CCN Type: OSVDB ID: 11394 Mozilla Multiple Products CSS Tag Email Address Enumeration Source: XF Type: UNKNOWN mozilla-css-obtain-emails(17949) Source: XF Type: UNKNOWN mozilla-css-obtain-emails(17949) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |