Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown

CVE-2012-4688

Disclosure Date: December 31, 2012 (last updated October 05, 2023)
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
0
Attacker Value
Unknown

CVE-2012-5821

Disclosure Date: November 04, 2012 (last updated February 09, 2024)
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
Attacker Value
Unknown

CVE-2010-2810

Disclosure Date: August 20, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in the convert_to_idna function in WWW/Library/Implementation/HTParse.c in Lynx 2.8.8dev.1 through 2.8.8dev.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed URL containing a % (percent) character in the domain name.
0
Attacker Value
Unknown

CVE-2006-7234

Disclosure Date: October 27, 2008 (last updated October 04, 2023)
Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
0
Attacker Value
Unknown

CVE-2008-4690

Disclosure Date: October 22, 2008 (last updated October 04, 2023)
lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
0
Attacker Value
Unknown

CVE-2005-2929

Disclosure Date: November 18, 2005 (last updated February 22, 2025)
Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
0
Attacker Value
Unknown

CVE-2005-3120

Disclosure Date: October 17, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
Attacker Value
Unknown

CVE-2004-1617

Disclosure Date: October 18, 2004 (last updated February 22, 2025)
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
0
Attacker Value
Unknown

CVE-2002-1405

Disclosure Date: February 19, 2003 (last updated February 22, 2025)
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
0
Attacker Value
Unknown

CVE-2000-0209

Disclosure Date: February 27, 2000 (last updated February 22, 2025)
Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page.
0