为提升您的使用体验,本站正在维护,部分功能暂时无法使用。如果本站文章无法解决您的问题,您想要向社区提问的话,请到 Twitter 上的 @FirefoxSupport 或 Reddit 上的 /r/firefox 提问,我们的支持社区将会很快回复您的疑问。

搜索 | 用户支持

防范以用户支持为名的诈骗。我们绝对不会要求您拨打电话或发送短信,及提供任何个人信息。请使用“举报滥用”选项报告涉及违规的行为。

详细了解

Calendar invite display

  • 1 个回答
  • 1 人有此问题
  • 1 次查看
  • 最后回复者为 christ1

more options

Thunderbird has a setting in View > Message Body As > Plain Text. For normal email, this means only a stripped text representation of the original email body is shown to prevent Thunderbird form loading and/or executing malicious code.

Observation: Messages containing *.ics attachments are displayed in a HTML table.

Question: Does this mean that sending malicious code in an *.ics can circumvent the Plain Text setting safety measures?

Thunderbird has a setting in View > Message Body As > Plain Text. For normal email, this means only a stripped text representation of the original email body is shown to prevent Thunderbird form loading and/or executing malicious code. Observation: Messages containing *.ics attachments are displayed in a HTML table. Question: Does this mean that sending malicious code in an *.ics can circumvent the Plain Text setting safety measures?

所有回复 (1)

more options

What exactly is your definition of 'malicious code'? If you're talking about embedded JavaScript, Thunderbird does not run JavaScript code in email messages per definition, and it cannot be turned on manually either.

If you mean to click on a link to a malicious web site in an email, this would also be possible in plain text messages.