CVE-2013-6050
https://notcve.org/view.php?id=CVE-2013-6050
Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables. Desbordamiento de enteros en Links anterior a la versión 2.8 permite a atacantes remotos provocar una denegación de servicio (caída) a través de tablas HTML. • http://links.twibright.com/download/ChangeLog http://www.debian.org/security/2013/dsa-2807 • CWE-189: Numeric Errors •
CVE-2008-3329
https://notcve.org/view.php?id=CVE-2008-3329
Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs." Vulnerabilidad no especificada en Links anterior a 2.1, cuando la opción "only proxies" (solo proxies) está activada, tiene un impacto y vectores de ataques desconocidos relacionado con que proporciona "URLs a programas externos". • http://links.twibright.com/download/ChangeLog http://www.securityfocus.com/bid/30422 https://exchange.xforce.ibmcloud.com/vulnerabilities/44035 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2008-3319 – Maian Links 3.1 - Insecure Cookie Handling
https://notcve.org/view.php?id=CVE-2008-3319
admin/index.php in Maian Links 3.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary links_cookie cookie. admin/index.php de Maian Links 3.1 y anteriores, permite a atacantes remotos evitar la autenticación y obtener acceso como administrador enviando una cookie links_cookie de su elección. • https://www.exploit-db.com/exploits/6062 http://secunia.com/advisories/31068 http://www.maianscriptworld.co.uk/free-php-scripts/maian-links/development/index.html http://www.maianscriptworld.co.uk/news.html http://www.securityfocus.com/bid/30205 https://exchange.xforce.ibmcloud.com/vulnerabilities/43749 • CWE-287: Improper Authentication •
CVE-2004-1616
https://notcve.org/view.php?id=CVE-2004-1616
Links allows remote attackers to cause a denial of service (memory consumption) via a web page or HTML email that contains a table with a td element and a large rowspan value,as demonstrated by mangleme. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://securitytracker.com/id?1011808 http://www.securityfocus.com/bid/11442 https://exchange.xforce.ibmcloud.com/vulnerabilities/17803 •
CVE-2002-1405 – Lynx 2.8.x - Command Line URL CRLF Injection
https://notcve.org/view.php?id=CVE-2002-1405
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters. Vulnerabilidad de inyección de CRLF en Lynx 2.8.4 y anteriores permite a atacantes remotos inyectar cabeceras HTTP falsas en una petición http provista en la linea de comandos, mediante una URL conteniendo un retorno de carro codificado, salto de línea, y otros caractéres espacio en blanco. • https://www.exploit-db.com/exploits/21722 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-049.0.txt http://marc.info/?l=bugtraq&m=102978118411977&w=2 http://marc.info/?l=bugtraq&m=103003793418021&w=2 http://www.debian.org/security/2002/dsa-210 http://www.iss.net/security_center/static/9887.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:023 http://www.redhat.com/support/errata/RHSA-2003-029.html http://www.redhat.com/support/errata •