Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Lynx
(Lynx_project)Repositories | https://github.com/ThomasDickey/lynx-snapshots |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1999-11-16 | CVE-1999-1549 | Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands. | Lynx | 7.8 | ||
2021-08-07 | CVE-2021-38165 | Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data. | Debian_linux, Fedora, Lynx | 5.3 | ||
2018-01-10 | CVE-2014-5002 | The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes. | Lynx | 7.8 | ||
2017-11-17 | CVE-2017-1000211 | Lynx before 2.8.9dev.16 is vulnerable to a use after free in the HTML parser resulting in memory disclosure, because HTML_put_string() can append a chunk onto itself. | Lynx | 5.3 |