Vulnerability Description
Mozilla Mail 1.7.1 and 1.7.3, and Thunderbird before 0.9, when HTML-Mails is enabled, allows remote attackers to determine valid e-mail addresses via an HTML e-mail that references a Cascading Style Sheets (CSS) document on the attacker's server.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Thunderbird | 0.8 |
References
- http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0070.html
- http://secunia.com/advisories/13086PatchVendor Advisory
- http://www.osvdb.org/11394Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17949
- http://archives.neohapsis.com/archives/fulldisclosure/2004-11/0070.html
- http://secunia.com/advisories/13086PatchVendor Advisory
- http://www.osvdb.org/11394Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17949
FAQ
What is CVE-2004-2226?
CVE-2004-2226 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Mozilla Mail 1.7.1 and 1.7.3, and Thunderbird before 0.9, when HTML-Mails is enabled, allows remote attackers to determine valid e-mail addresses via an HTML e-mail that references a Cascading Style S...
How severe is CVE-2004-2226?
CVE-2004-2226 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-2226?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Thunderbird.