Lookup for vulnerabilities affecting packages.
| Vulnerability_id | VCID-dbre-65bp-xbf1 |
| Summary | Security researcher Fabián Cuchietti discovered that
it was possible to bypass the restriction on JavaScript execution in mail by
embedding an <iframe> with a data: URL within a message. If the victim
replied or forwarded the mail after receiving it, quoting it "in-line"
using Thunderbird's HTML mail editor, it would run the attached script. The
running script would be restricted to the mail composition window where it could
observe and potentially modify the content of the mail before it was sent.
Scripts were not executed if the recipient merely viewed the mail, only if it
was edited as HTML. Turning off HTML composition prevented the vulnerability and
forwarding the mail "as attachment" prevented the forwarding
variant.Ateeq ur Rehman Khan of Vulnerability Labs reported
additional variants of this attack involving the use of the <object> tag
and which could be used to attach object data types such as images, audio, or
video.This affected the Thunderbird 17 branch. It was fixed in all
versions based on Gecko 23 or later. Thunderbird 24 and later are not affected
by this vulnerability. |
| Aliases |
|
| Fixed_packages |
|
| Affected_packages |
|
| References |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6674 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97711 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.9768 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97687 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97688 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97693 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97696 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97698 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97701 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97702 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.47529 |
| scoring_system |
epss |
| scoring_elements |
0.97708 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6674 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| Weaknesses |
|
| Exploits |
| 0 |
| date_added |
2014-01-27 |
| description |
Mozilla Thunderbird 17.0.6 - Input Validation Filter Bypass |
| required_action |
null |
| due_date |
null |
| notes |
null |
| known_ransomware_campaign_use |
false |
| source_date_published |
2014-01-27 |
| exploit_type |
dos |
| platform |
multiple |
| source_date_updated |
2014-01-27 |
| data_source |
Exploit-DB |
| source_url |
https://www.vulnerability-lab.com/get_content.php?id=953 |
|
|
| Severity_range_score | 7.0 - 8.9 |
| Exploitability | 2.0 |
| Weighted_severity | 8.0 |
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/vulnerabilities/VCID-dbre-65bp-xbf1 |