Page 2 of 9 results (0.004 seconds)

CVSS: 5.0EPSS: 2%CPEs: 16EXPL: 1

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://secunia.com/advisories/20383 http://securitytracker.com/id?1011809 http://www.debian.org/security/2006/dsa-1076 http://www.debian.org/security/2006/dsa-1077 http://www.debian.org/security/2006/dsa-1085 http://www.securityfocus.com/archive/1/435689/30/4740/threaded http://www.securityfocus.com/ • CWE-20: Improper Input Validation •

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page. • http://www.securityfocus.com/bid/1012 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 2

Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands. • http://marc.info/?l=bugtraq&m=94286509804526&w=2 http://www.securityfocus.com/bid/804 • CWE-346: Origin Validation Error •

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

Lynx allows a local user to overwrite sensitive files through /tmp symlinks. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0371 •