Show filters
23 Total Results
Displaying 11-20 of 23
Sort by:
Attacker Value
Unknown
CVE-2012-4688
Disclosure Date: December 31, 2012 (last updated October 05, 2023)
The Central application in i-GEN opLYNX before 2.01.9 allows remote attackers to bypass authentication via vectors involving the disabling of browser JavaScript support.
0
Attacker Value
Unknown
CVE-2012-5821
Disclosure Date: November 04, 2012 (last updated February 09, 2024)
Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function.
0
Attacker Value
Unknown
CVE-2010-2810
Disclosure Date: August 20, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in the convert_to_idna function in WWW/Library/Implementation/HTParse.c in Lynx 2.8.8dev.1 through 2.8.8dev.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed URL containing a % (percent) character in the domain name.
0
Attacker Value
Unknown
CVE-2006-7234
Disclosure Date: October 27, 2008 (last updated October 04, 2023)
Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
0
Attacker Value
Unknown
CVE-2008-4690
Disclosure Date: October 22, 2008 (last updated October 04, 2023)
lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
0
Attacker Value
Unknown
CVE-2005-2929
Disclosure Date: November 18, 2005 (last updated February 22, 2025)
Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
0
Attacker Value
Unknown
CVE-2005-3120
Disclosure Date: October 17, 2005 (last updated February 22, 2025)
Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
0
Attacker Value
Unknown
CVE-2004-1617
Disclosure Date: October 18, 2004 (last updated February 22, 2025)
Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value.
0
Attacker Value
Unknown
CVE-2002-1405
Disclosure Date: February 19, 2003 (last updated February 22, 2025)
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters.
0
Attacker Value
Unknown
CVE-2000-0209
Disclosure Date: February 27, 2000 (last updated February 22, 2025)
Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page.
0