libsylph/utils.c in Sylpheed through 3.6 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
[ { "events": [ { "introduced": "0" }, { "last_affected": "3.6" } ] } ]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17517.json"