{"id":"CVE-2016-7966","details":"Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.","modified":"2026-03-12T22:22:27.975615Z","published":"2016-12-23T22:59:00.220Z","related":["openSUSE-SU-2016:2558-1","openSUSE-SU-2016:2559-1","openSUSE-SU-2024:10509-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QNMM5TVPTJQFPJ3YDF4DPXDFW3GQLWLY/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2016-10/msg00065.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3697"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2016/10/05/1"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93360"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"25"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7966.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}