12 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

06 Apr 2023 — Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacture... • https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration • CWE-311: Missing Encryption of Sensitive Data CWE-602: Client-Side Enforcement of Server-Side Security •

CVSS: 5.3EPSS: 3%CPEs: 6EXPL: 0

07 Aug 2021 — Lynx through 2.8.9 mishandles the userinfo subcomponent of a URI, which allows remote attackers to discover cleartext credentials because they may appear in SNI data. HTParse en Lynx versiones hasta 2.8.9, maneja inapropiadamente el subcomponente userinfo de un URI, que permite a atacantes remotos descubrir credenciales en texto sin cifrar porque pueden aparecer en los datos SNI o en los encabezados HTTP A flaw was found in the way lynx parsed URLs with userinfo part containing authentication credentials. T... • http://www.openwall.com/lists/oss-security/2021/08/07/11 • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 3

10 Jan 2018 — The lynx gem before 1.0.0 for Ruby places the configured password on command lines, which allows local users to obtain sensitive information by listing processes. El GEM de lynx versión anterior a 1.0.0 para Ruby fija la contraseña configurada en las líneas de comando, lo que permite a los usuarios locales obtener información confidencial mediante procesos de listado. • http://www.openwall.com/lists/oss-security/2014/07/07/23 • CWE-255: Credentials Management Errors •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

17 Nov 2017 — Lynx before 2.8.9dev.16 is vulnerable to a use after free in the HTML parser resulting in memory disclosure, because HTML_put_string() can append a chunk onto itself. Lynx en versiones anteriores a la 2.8.9dev.16 es vulnerable a un uso de memoria previamente liberada en el analizador HTML, lo que resulta en una fuga de información, ya que HTML_put_string() puede acoplarse un fragmento de información (chunk). • http://lynx.invisible-island.net/current/CHANGES.html • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

22 Dec 2016 — lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host. lynx: Se ha descubierto que Lynx no analiza correctamente el componente de autoridad de la URL cuando la parte del nombre del anfitrión termina con '?', y podría en su lugar ser engañado para conectar con un anfitrión distinto. • http://www.openwall.com/lists/oss-security/2016/11/04/1 • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 5EXPL: 1

04 Nov 2012 — Lynx does not verify that the server's certificate is signed by a trusted certification authority, which allows man-in-the-middle attackers to spoof SSL servers via a crafted certificate, related to improper use of a certain GnuTLS function. Lynx no verifica que el certificado del servidor está firmado por una autoridad de certificación de confianza, lo que permite ataques man-in-the-middle con los que se falsifican servidores SSL mediante certificados hechos a mano. Se trata de un problema relacionado con ... • http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf • CWE-295: Improper Certificate Validation •

CVSS: 9.8EPSS: 2%CPEs: 4EXPL: 0

20 Aug 2010 — Heap-based buffer overflow in the convert_to_idna function in WWW/Library/Implementation/HTParse.c in Lynx 2.8.8dev.1 through 2.8.8dev.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed URL containing a % (percent) character in the domain name. Desbordamiento de búfer basado en la memoria dinámica en la función convert_to_idna en WWW/Library/Implementation/HTParse.c en Lynx v2.8.8dev.1 hasta v2.8.8dev.4 permite a atacantes remotos pr... • http://marc.info/?l=oss-security&m=128151768510564&w=2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 179EXPL: 1

27 Oct 2008 — Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory. Vulnerabilidad de ruta de búsqueda no confiable en Lynx anterior a 2.8.6rel.4; permite a usuarios locales ejecutar código de su elección a través de los ficheros maliciosos (1) .mailcap y (2) mime.types en el directorio de trabajo actual. • https://www.exploit-db.com/exploits/32530 •

CVSS: 10.0EPSS: 18%CPEs: 176EXPL: 0

22 Oct 2008 — lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929. NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler. lynx v2.8.6dev.15 y anteriores, cuando está activado el modo avanzado y lynx está configurado como manejador de URL, permite a atacantes remotos ejecutar comandos de su elección a través de un ... • http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 2

01 Dec 2006 — SQL injection vulnerability in products.asp in Evolve shopping cart (aka Evolve Merchant) allows remote attackers to execute arbitrary SQL commands via the partno parameter. NOTE: the vendor disputes this issue, stating that it is a forced SQL error ** IMPUGNADA ** Vulnerabilidad de inyección SQL en products.asp de Evolve shopping cart (también conocido como Evolve Merchant) permite a atacantes remotos ejecutar comandos SQL de su elección a través del parámetro partno. NOTA: el vendedor impugna este asunto,... • https://www.exploit-db.com/exploits/29197 •