Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Unknown
CVE-2024-35246
Disclosure Date: June 20, 2024 (last updated June 21, 2024)
An attacker may be able to cause a denial-of-service condition by sending many packets repeatedly.
0
Attacker Value
Unknown
CVE-2024-32943
Disclosure Date: June 20, 2024 (last updated June 21, 2024)
An attacker may be able to cause a denial-of-service condition by sending many SSH packets repeatedly.
0
Attacker Value
Unknown
CVE-2024-37183
Disclosure Date: June 20, 2024 (last updated June 21, 2024)
Plain text credentials and session ID can be captured with a network sniffer.
0
Attacker Value
Unknown
CVE-2021-38165
Disclosure Date: August 07, 2021 (last updated February 23, 2025)
Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data.
0
Attacker Value
Unknown
CVE-2020-9055
Disclosure Date: April 12, 2019 (last updated February 21, 2025)
Versiant LYNX Customer Service Portal (CSP), version 3.5.2, is vulnerable to stored cross-site scripting, which could allow a local, authenticated attacker to insert malicious JavaScript that is stored and displayed to the end user. This could lead to website redirects, session cookie hijacking, or information disclosure.
0
Attacker Value
Unknown
CVE-2014-5002
Disclosure Date: January 10, 2018 (last updated November 26, 2024)
The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes.
0
Attacker Value
Unknown
CVE-2017-1000211
Disclosure Date: November 17, 2017 (last updated November 26, 2024)
Lynx before 2.8.9dev.16 is vulnerable to a use after free in the HTML parser resulting in memory disclosure, because HTML_put_string() can append a chunk onto itself.
0
Attacker Value
Unknown
CVE-2016-10305
Disclosure Date: March 30, 2017 (last updated November 26, 2024)
Trango Apex <= 2.1.1, ApexLynx < 2.0, ApexOrion < 2.0, ApexPlus <= 3.2.0, Giga <= 2.6.1, GigaLynx < 2.0, GigaOrion < 2.0, GigaPlus <= 3.2.3, GigaPro <= 1.4.1, StrataLink < 3.0, and StrataPro devices have a built-in, hidden root account, with a default password that was once stored in cleartext within a software update package on a Trango FTP server. This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
0
Attacker Value
Unknown
CVE-2016-10307
Disclosure Date: March 30, 2017 (last updated November 26, 2024)
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
0
Attacker Value
Unknown
CVE-2016-9179
Disclosure Date: December 22, 2016 (last updated November 25, 2024)
lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
0