mailnews in Mozilla Thunderbird before 2.0.0.18 and SeaMonkey before 1.1.13, when JavaScript is enabled in mail, allows remote attackers to obtain sensitive information about the recipient, or comments in forwarded mail, via script that reads the (1) .documentURI or (2) .textContent DOM properties.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/32714 - Vendor Advisory | |
References | () http://secunia.com/advisories/32715 - Vendor Advisory | |
References | () http://www.mozilla.org/security/announce/2008/mfsa2008-59.html - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/32363 - | |
References | () http://www.securitytracker.com/id?1021247 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=458883 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/46734 - |
Information
Published : 2009-08-13 16:30
Updated : 2024-11-21 00:57
NVD link : CVE-2008-6961
Mitre link : CVE-2008-6961
CVE.ORG link : CVE-2008-6961
JSON object : View
Products Affected
mozilla
- thunderbird
- seamonkey
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor