Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation64 reference(s) from NVD