Vulnerabilities (CVE)

Filtered by CWE-94
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-9949 2 Apport Project, Canonical 2 Apport, Ubuntu Linux 2017-01-07 9.3 HIGH 7.8 HIGH
An issue was discovered in Apport before 2.20.4. In apport/ui.py, Apport reads the CrashDB field and it then evaluates the field as Python code if it begins with a "{". This allows remote attackers to execute arbitrary Python code.
CVE-2016-7966 4 Debian, Fedoraproject, Kde and 1 more 4 Debian Linux, Fedora, Kmail and 1 more 2016-12-27 7.5 HIGH 7.3 HIGH
Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
CVE-2016-7967 1 Kde 1 Kmail 2016-12-27 5.8 MEDIUM 8.1 HIGH
KMail since version 5.3.0 used a QWebEngine based viewer that had JavaScript enabled. Since the generated html is executed in the local file security context by default access to remote and local URLs was enabled.