Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7966

Опубликовано: 23 дек. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.5
CVSS3: 7.3

Описание

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

РелизСтатусПримечание
devel

released

5.26.0-0ubuntu2
esm-apps/xenial

released

5.18.0-0ubuntu1.1
esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
precise

not-affected

code not present
precise/esm

DNE

precise was not-affected [code not present]
trusty

not-affected

code not present
trusty/esm

not-affected

code not present
upstream

not-affected

code not present
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

released

4:4.13.3-0ubuntu0.4
precise

released

4:4.8.5-0ubuntu0.3
precise/esm

DNE

precise was released [4:4.8.5-0ubuntu0.3]
trusty

released

4:4.13.3-0ubuntu0.4
trusty/esm

released

4:4.13.3-0ubuntu0.4
upstream

needed

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

precise

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

Показывать по

EPSS

Процентиль: 60%
0.00391
Низкий

7.5 High

CVSS2

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 4.3
redhat
больше 9 лет назад

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

CVSS3: 7.3
nvd
около 9 лет назад

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

CVSS3: 7.3
debian
около 9 лет назад

Through a malicious URL that contained a quote character it was possib ...

CVSS3: 7.3
github
больше 3 лет назад

Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.

EPSS

Процентиль: 60%
0.00391
Низкий

7.5 High

CVSS2

7.3 High

CVSS3

Уязвимость CVE-2016-7966