Mozilla Thunderbird prior to 1.5.0.7 and SeaMonkey prior to 1.0.5, with "Load Images" enabled, allows remote user-assisted malicious users to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla seamonkey |
||
mozilla thunderbird |