vulnerability
Arch Linux: Insufficient validation (CVE-2016-7966)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Dec 23, 2016 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Dec 23, 2016
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plain text viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
Solution
arch-linux-upgrade-latest
References
- CVE-2016-7966
- https://attackerkb.com/topics/CVE-2016-7966
- URL-http://lists.opensuse.org/opensuse-updates/2016-10/msg00065.html
- URL-http://seclists.org/oss-sec/2016/q4/23
- URL-http://www.debian.org/security/2016/dsa-3697
- URL-http://www.openwall.com/lists/oss-security/2016/10/05/1
- URL-http://www.securityfocus.com/bid/93360
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/
- URL-https://security.archlinux.org/ASA-201610-4
- URL-https://www.kde.org/info/security/advisory-20161006-1.txt
- CWE-94
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.