This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.
The remote Windows host contains a mail client that is potentially
affected by several vulnerabilities.
The installed version of Thunderbird 10.x is potentially affected by
the following security issues :
- The true value of 'window.location' can be shadowed by
user content through the use of the 'valueOf' method,
which can be combined with some plugins to perform
cross-site scripting attacks. (CVE-2012-4194)
- The 'CheckURL' function of 'window.location' can be
forced to return the wrong calling document and
principal, allowing a cross-site scripting attack.
- It is possible to use property injection by prototype to
bypass security wrapper protections on the 'Location'
object, allowing the cross-origin reading of the
'Location' object. (CVE-2012-4196)
See also :
Upgrade to Thunderbird 10.0.10 ESR or later.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true