Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-7967

Опубликовано: 23 дек. 2016
Источник: debian
EPSS Низкий

Описание

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
kf5-messagelibnot-affectedpackage

Примечания

  • https://www.kde.org/info/security/advisory-20161006-2.txt

  • Fixed by: https://github.com/KDE/messagelib/commit/dfc6a86f1b25f1da04b8f1df5320fcdd7085bcc1 (16.11.80)

  • The issue is mitigated with the fixes applied for CVE-2016-7966, and a

  • user protected from this CVE by only viewing plain text mails.

EPSS

Процентиль: 56%
0.00332
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

CVSS3: 6.3
redhat
больше 9 лет назад

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

CVSS3: 8.1
nvd
около 9 лет назад

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

CVSS3: 8.1
github
больше 3 лет назад

KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.

EPSS

Процентиль: 56%
0.00332
Низкий