Page 2 of 9 results (0.006 seconds)

CVSS: 7.5EPSS: 84%CPEs: 2EXPL: 2

Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements. Los navegadores web Links 1.00pre12 y Elinks 0.9.2 con smbclient instalado permite a atacantes remotos ejecutar código arbitrario a través de metacaracteres del shell en un smb:// URI, como se ha demostrado mediante el uso de las sentencias PUT y GET. • https://www.exploit-db.com/exploits/29033 https://www.exploit-db.com/exploits/2784 http://bugzilla.elinks.cz/show_bug.cgi?id=841 http://marc.info/?l=full-disclosure&m=116355556512780&w=2 http://secunia.com/advisories/22905 http://secunia.com/advisories/22920 http://secunia.com/advisories/22923 http://secunia.com/advisories/23022 http://secunia.com/advisories/23132 http://secunia.com/advisories/23188 http://secunia.com/advisories/23234 http://secunia.com/advisories&#x •

CVSS: 5.0EPSS: 1%CPEs: 9EXPL: 1

Links allows remote attackers to cause a denial of service (memory consumption) via a web page or HTML email that contains a table with a td element and a large rowspan value,as demonstrated by mangleme. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://securitytracker.com/id?1011808 http://www.securityfocus.com/bid/11442 https://exchange.xforce.ibmcloud.com/vulnerabilities/17803 •

CVSS: 5.0EPSS: 4%CPEs: 9EXPL: 1

CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters. Vulnerabilidad de inyección de CRLF en Lynx 2.8.4 y anteriores permite a atacantes remotos inyectar cabeceras HTTP falsas en una petición http provista en la linea de comandos, mediante una URL conteniendo un retorno de carro codificado, salto de línea, y otros caractéres espacio en blanco. • https://www.exploit-db.com/exploits/21722 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-049.0.txt http://marc.info/?l=bugtraq&m=102978118411977&w=2 http://marc.info/?l=bugtraq&m=103003793418021&w=2 http://www.debian.org/security/2002/dsa-210 http://www.iss.net/security_center/static/9887.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:023 http://www.redhat.com/support/errata/RHSA-2003-029.html http://www.redhat.com/support/errata&#x •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

Buffer overflow in Links 2.0 pre4 allows remote attackers to crash client browsers and possibly execute arbitrary code via gamma tables in large 16-bit PNG images. • http://atrey.karlin.mff.cuni.cz/~clock/twibright/links/download/ChangeLog http://www.iss.net/security_center/static/9287.php http://www.securityfocus.com/bid/4921 •