Funkcionalnosć toś togo sedła se pśez wótwardowańske źěła wobgranicujo, kótarež maju wašo dožywjenje pólěpšyś. Jolic nastawk waš problem njerozwězujo a cośo pšašanje stajiś, wobrośćo se na našo zgromoźeństwo pomocy, kótarež na to caka, wam na @FirefoxSupport na Twitter a /r/firefox na Reddit pomagaś.

Pomoc pśepytaś

Glědajśo se wobšudy pomocy. Njenapominajomy was nigda, telefonowy numer zawołaś, SMS pósłaś abo wósobinske informacije pśeraźiś. Pšosym dajśo suspektnu aktiwitu z pomocu nastajenja „Znjewužywanje k wěsći daś“ k wěsći.

Dalšne informacije

Calendar invite display

  • 1 wótegrono
  • 1 ma toś ten problem
  • 14 naglědow
  • Slědne wótegrono wót christ1

more options

Thunderbird has a setting in View > Message Body As > Plain Text. For normal email, this means only a stripped text representation of the original email body is shown to prevent Thunderbird form loading and/or executing malicious code.

Observation: Messages containing *.ics attachments are displayed in a HTML table.

Question: Does this mean that sending malicious code in an *.ics can circumvent the Plain Text setting safety measures?

Thunderbird has a setting in View > Message Body As > Plain Text. For normal email, this means only a stripped text representation of the original email body is shown to prevent Thunderbird form loading and/or executing malicious code. Observation: Messages containing *.ics attachments are displayed in a HTML table. Question: Does this mean that sending malicious code in an *.ics can circumvent the Plain Text setting safety measures?

Wšykne wótegrona (1)

more options

What exactly is your definition of 'malicious code'? If you're talking about embedded JavaScript, Thunderbird does not run JavaScript code in email messages per definition, and it cannot be turned on manually either.

If you mean to click on a link to a malicious web site in an email, this would also be possible in plain text messages.