KDE KMail 4.4.0

CPE Details

KDE KMail 4.4.0
4.4.0
2016-12-28
11h39 +00:00
2016-12-28
11h39 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:kde:kmail:4.4.0:*:*:*:*:*:*:*

Informations

Vendor

kde

Product

kmail

Version

4.4.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-11880 2020-04-17 15h07 +00:00 An issue was discovered in KDE KMail before 19.12.3. By using the proprietary (non-RFC6068) "mailto?attach=..." parameter, a website (or other source of mailto links) can make KMail attach local files to a composed email message without showing a warning to the user, as demonstrated by an attach=.bash_history value.
6.5
Moyen
CVE-2017-9604 2017-06-13 13h00 +00:00 KDE kmail before 5.5.2 and messagelib before 5.5.2, as distributed in KDE Applications before 17.04.2, do not ensure that a plugin's sign/encrypt action occurs during use of the Send Later feature, which allows remote attackers to obtain sensitive information by sniffing the network.
7.5
Haute
CVE-2016-7966 2016-12-23 21h00 +00:00 Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
7.3
Haute
CVE-2016-7967 2016-12-23 21h00 +00:00 KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.
8.1
Haute
CVE-2016-7968 2016-12-23 21h00 +00:00 KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. HTML Mail contents were not sanitized for JavaScript and included code was executed.
6.5
Moyen