CVE-2016-7966

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.3 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
kdekmail
𝑥
≤ 4.4.0
debiandebian_linux
8.0
suselinux_enterprise
12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
kcoreaddons
bullseye
5.78.0-4
fixed
bookworm
5.103.0-1
fixed
sid
5.115.0-2
fixed
trixie
5.115.0-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
kcoreaddons
zesty
Fixed 5.26.0-0ubuntu2
released
yakkety
Fixed 5.26.0-0ubuntu2
released
xenial
Fixed 5.18.0-0ubuntu1.1
released
trusty
dne
precise
dne
kdepim
zesty
not-affected
yakkety
not-affected
xenial
not-affected
trusty
not-affected
precise
not-affected
kdepimlibs
zesty
not-affected
yakkety
not-affected
xenial
not-affected
trusty
Fixed 4:4.13.3-0ubuntu0.4
released
precise
Fixed 4:4.8.5-0ubuntu0.3
released
kf5-messagelib
zesty
not-affected
yakkety
ignored
xenial
dne
trusty
dne
precise
dne