Thunderbird before 0.9, when running on Windows systems, uses the default handler when processing javascript: links, which invokes Internet Explorer and may expose the Thunderbird user to vulnerabilities in the version of Internet Explorer that is installed on the user's system. NOTE: since the invocation between multiple products is a common practice, and the vulnerabilities inherent in multi-product interactions are not easily enumerable, this issue might be REJECTED in the future.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mozilla.org/security/announce/mfsa2005-10.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/12407 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=263546 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/19173 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100048 - |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0148
Mitre link : CVE-2005-0148
CVE.ORG link : CVE-2005-0148
JSON object : View
Products Affected
mozilla
- thunderbird
CWE