
CVE-2013-6050 – Mandriva Linux Security Advisory 2013-292
https://notcve.org/view.php?id=CVE-2013-6050
30 Nov 2013 — Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables. Desbordamiento de enteros en Links anterior a la versión 2.8 permite a atacantes remotos provocar una denegación de servicio (caída) a través de tablas HTML. Mikulas Patocka discovered an integer overflow in the parsing of HTML tables in the Links web browser. This can only be exploited when running Links in graphical mode. • http://links.twibright.com/download/ChangeLog • CWE-189: Numeric Errors •

CVE-2008-3329
https://notcve.org/view.php?id=CVE-2008-3329
27 Jul 2008 — Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs." Vulnerabilidad no especificada en Links anterior a 2.1, cuando la opción "only proxies" (solo proxies) está activada, tiene un impacto y vectores de ataques desconocidos relacionado con que proporciona "URLs a programas externos". • http://links.twibright.com/download/ChangeLog • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2008-3319 – Maian Links 3.1 - Insecure Cookie Handling
https://notcve.org/view.php?id=CVE-2008-3319
25 Jul 2008 — admin/index.php in Maian Links 3.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary links_cookie cookie. admin/index.php de Maian Links 3.1 y anteriores, permite a atacantes remotos evitar la autenticación y obtener acceso como administrador enviando una cookie links_cookie de su elección. • https://www.exploit-db.com/exploits/6062 • CWE-287: Improper Authentication •

CVE-2006-5925 – Links_ ELinks 'smbclient' - Remote Command Execution
https://notcve.org/view.php?id=CVE-2006-5925
15 Nov 2006 — Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements. Los navegadores web Links 1.00pre12 y Elinks 0.9.2 con smbclient instalado permite a atacantes remotos ejecutar código arbitrario a través de metacaracteres del shell en un smb:// URI, como se ha demostrado mediante el uso de las sentencias PUT y GET. • https://www.exploit-db.com/exploits/29033 •

CVE-2004-1616
https://notcve.org/view.php?id=CVE-2004-1616
18 Oct 2004 — Links allows remote attackers to cause a denial of service (memory consumption) via a web page or HTML email that contains a table with a td element and a large rowspan value,as demonstrated by mangleme. • http://lcamtuf.coredump.cx/mangleme/gallery •

CVE-2002-1405 – Lynx 2.8.x - Command Line URL CRLF Injection
https://notcve.org/view.php?id=CVE-2002-1405
19 Feb 2003 — CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters. Vulnerabilidad de inyección de CRLF en Lynx 2.8.4 y anteriores permite a atacantes remotos inyectar cabeceras HTTP falsas en una petición http provista en la linea de comandos, mediante una URL conteniendo un retorno de carro codificado, salto de línea, y... • https://www.exploit-db.com/exploits/21722 •

CVE-2002-2060
https://notcve.org/view.php?id=CVE-2002-2060
31 Dec 2002 — Buffer overflow in Links 2.0 pre4 allows remote attackers to crash client browsers and possibly execute arbitrary code via gamma tables in large 16-bit PNG images. • http://atrey.karlin.mff.cuni.cz/~clock/twibright/links/download/ChangeLog •