Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown

CVE-2024-35246

Disclosure Date: June 20, 2024 (last updated June 21, 2024)
An attacker may be able to cause a denial-of-service condition by sending many packets repeatedly.
0
Attacker Value
Unknown

CVE-2024-32943

Disclosure Date: June 20, 2024 (last updated June 21, 2024)
An attacker may be able to cause a denial-of-service condition by sending many SSH packets repeatedly.
0
Attacker Value
Unknown

CVE-2024-37183

Disclosure Date: June 20, 2024 (last updated June 21, 2024)
Plain text credentials and session ID can be captured with a network sniffer.
0
Attacker Value
Unknown

CVE-2021-38165

Disclosure Date: August 07, 2021 (last updated February 23, 2025)
Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data.
Attacker Value
Unknown

CVE-2020-9055

Disclosure Date: April 12, 2019 (last updated February 21, 2025)
Versiant LYNX Customer Service Portal (CSP), version 3.5.2, is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to insert malicious JavaScript that is stored and displayed to the end user. This could lead to website redirects, session cookie hijacking, or information disclosure.
Attacker Value
Unknown

CVE-2014-5002

Disclosure Date: January 10, 2018 (last updated November 26, 2024)
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
0
Attacker Value
Unknown

CVE-2017-1000211

Disclosure Date: November 17, 2017 (last updated November 26, 2024)
Lynx before 2.8.9dev.16 is vulnerable to a use after free in the HTML parser resulting in memory disclosure, because HTML_put_string() can append a chunk onto itself.
0
Attacker Value
Unknown

CVE-2016-10305

Disclosure Date: March 30, 2017 (last updated November 26, 2024)
Trango Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, and StrataPro devices have a built-in, hidden root account, with a default password that was once stored in cleartext within a software update package on a Trango FTP server. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Attacker Value
Unknown

CVE-2016-10307

Disclosure Date: March 30, 2017 (last updated November 26, 2024)
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Attacker Value
Unknown

CVE-2016-9179

Disclosure Date: December 22, 2016 (last updated November 25, 2024)
lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
0