6 results (0.002 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.7/SCOSA-2006.7.txt ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.55/SCOSA-2005.55.txt http://secunia.com/advisories/17372 http://secunia.com/advisories/17512 http://secunia.com/advisories/17546 http://secunia.com/advisories/17556 http://secunia.com/advisories/17576 http://secunia.com/advisories/17666 http://secunia.com/advisories/17757 http://secunia.com/advisories/18051 http://secunia.com/advisories/18376 http • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.0EPSS: 2%CPEs: 16EXPL: 1

Lynx, lynx-ssl, and lynx-cur before 2.8.6dev.8 allow remote attackers to cause a denial of service (infinite loop) via a web page or HTML email that contains invalid HTML including (1) a TEXTAREA tag with a large COLS value and (2) a large tag name in an element that is not terminated, as demonstrated by mangleme. NOTE: a followup suggests that the relevant trigger for this issue is the large COLS value. • http://lcamtuf.coredump.cx/mangleme/gallery http://lists.grok.org.uk/pipermail/full-disclosure/2004-October/027709.html http://marc.info/?l=bugtraq&m=109811406620511&w=2 http://secunia.com/advisories/20383 http://securitytracker.com/id?1011809 http://www.debian.org/security/2006/dsa-1076 http://www.debian.org/security/2006/dsa-1077 http://www.debian.org/security/2006/dsa-1085 http://www.securityfocus.com/archive/1/435689/30/4740/threaded http://www.securityfocus.com/ • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 4%CPEs: 9EXPL: 1

CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace characters. Vulnerabilidad de inyección de CRLF en Lynx 2.8.4 y anteriores permite a atacantes remotos inyectar cabeceras HTTP falsas en una petición http provista en la linea de comandos, mediante una URL conteniendo un retorno de carro codificado, salto de línea, y otros caractéres espacio en blanco. • https://www.exploit-db.com/exploits/21722 ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-049.0.txt http://marc.info/?l=bugtraq&m=102978118411977&w=2 http://marc.info/?l=bugtraq&m=103003793418021&w=2 http://www.debian.org/security/2002/dsa-210 http://www.iss.net/security_center/static/9887.php http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:023 http://www.redhat.com/support/errata/RHSA-2003-029.html http://www.redhat.com/support/errata&#x •

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page. • http://www.securityfocus.com/bid/1012 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0817 •