Home
How it works
Integrations
Pricing
Vulnerability Database
Breach Intelligence
Search Data
Database Index
Blog
Contact
Book a Demo
Vulnerability Database
Total number of vulnerabilities in the DB: 308,377
With exploit
university_of_kansas / lynx
You can search for specific versions with
https://synscan.net/product/lynx/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2005-2929
High
Nov 18, 2005
== 2.8.6
== 2.8.6_dev13
== 2.8.5
CVE-2004-1617
Medium
Oct 18, 2004
== 2.8.4
== 2.8.3_pre5
== 2.8.5_dev5
== 2.7
== 2.8.4_rel1
== 2.8.1
== 2.8
== 2.8.3
== 2.8.5_dev8
== 2.8.2_rel1
== 2.8.5_dev3
== 2.8.3_rel1
== 2.8.5_dev2
== 2.8.5_dev4
== 2.8.3_dev22
== 2.8.5
CVE-2002-1405
Medium
Feb 19, 2003
== 2.8.4
== 2.8.4_rel1
== 2.8.3
== 2.8.5_dev8
== 2.8.2_rel1
== 2.8.3_rel1
CVE-2000-0209
High
Feb 27, 2000
== 2.7
== 2.8
== 2.8.3_dev22
CVE-1999-0817
High
Sep 15, 1999
*
CVE-1999-0371
Low
Feb 11, 1999
<= 2.7.1
lynx / lynx
You can search for specific versions with
https://synscan.net/product/lynx/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2016-9179
Medium
Dec 22, 2016
*
CVE-2010-2810
Medium
Aug 20, 2010
== 2.8.8-dev.2
== 2.8.8-dev.3
== 2.8.8-dev.1
== 2.8.8-dev.4
CVE-2006-7234
Low
Oct 27, 2008
== 2.8.3-pre1
== 2.8.1-dev.5
<= 2.8.6
== 2.8.5-dev.6
== 2.8.1-dev.20
== 2.8.2-dev.17
== 2.8.6-dev5
== 2.8.4-dev17
== 2.8.6-dev4
== 2.8.4-dev11
== 2.8.4-dev10
== 2.8.5-dev.3
== 2.8.1-dev.7
== 2.8.3-pre6
== 2.8.6-dev8
== 2.8.5-pre.1
== 2.8.2-dev.22
== 2.8.3-dev.11
== 2.8.4-pre.1
== 2.8.5-dev.9
== 2.8.1-rel.2
== 2.8.1-dev.10
== 2.8.3-dev.7
== 2.8.3-dev.17
== 2.8.1-dev.13
== 2.8.1-pre.5
== 2.8.4-dev5
== 2.8.4-pre.4
== 2.8.6-dev14
== 2.8.1-dev.15
== 2.8.3-rel1
== 2.8.3-pre7
== 2.8.1-pre.7
== 2.8.3-dev.10
== 2.8.2-pre.5
== 2.8.2-rel.1
== 2.8.2-dev.11
== 2.8.5-dev.13
== 2.8.2-dev.5
== 2.8.2-dev.26
== 2.8.1-dev.8
== 2.8.1-pre.4
== 2.8.5-dev.14
== 2.8.1-pre.10
== 2.8.1-dev.17
== 2.8.3-dev.6
== 2.8.6-dev15
== 2.8.2-dev.12
== 2.8.2-dev.8
== 2.8.4-dev3
== 2.8.4-dev21
== 2.8.2-dev.6
== 2.8.1-rel.1
== 2.8.6-dev12
== 2.8.6-dev2
== 2.8.6-rel1
== 2.8.4-pre.2
== 2.8.1-dev.27
== 2.8.1-dev.16
== 2.8.2-pre.1
== 2.8.1-dev.14
== 2.8.3-dev.4
== 2.8.5-dev.2
== 2.8.3-dev.1
== 2.8.2-dev.9
== 2.8.4-dev8
== 2.8.2-pre.9
== 2.8.2-dev.13
== 2.8.3-dev.23
== 2.8.3-dev.18
== 2.8.2-dev.14
== 2.8.2-dev.19
== 2.8.3-dev.12
== 2.8.2-pre.11
== 2.8.1-pre.1
== 2.8.3-dev.21
== 2.8.1-dev.2
== 2.8.3-pre8
== 2.8.1-dev.28
== 2.8.4-rel.1
== 2.8.1-pre.8
== 2.8.4-dev13
== 2.8.4-dev6
== 2.8.2-dev.3
== 2.8.3-pre2
== 2.8.2-pre.6
== 2.8.3-dev.2
== 2.8.2-dev.16
== 2.8.5-dev.5
== 2.8.6-dev7
== 2.8.1-pre.6
== 2.8.3-dev.16
== 2.8.3-dev.19
== 2.8.5-dev.1
== 2.8.4-dev14
== 2.8.5-dev.17
== 2.8.1-dev.4
== 2.8.1-dev.29
== 2.8.4-dev19
== 2.8.2-dev.20
== 2.8.1-pre.2
== 2.8.1-dev.1
== 2.8.4-dev9
== 2.8.1-dev.22
== 2.8.3-pre5
== 2.8.5-pre.5
== 2.8.6-dev1
== 2.8.5-dev.12
== 2.8.1-dev.19
== 2.8.3-dev.9
== 2.8.2-pre.10
== 2.8.2-dev.21
== 2.8.2-dev.23
== 2.8.2-pre.3
== 2.8.2-dev.2
== 2.8.2-dev.18
== 2.8.3-dev.3
== 2.8.4-dev20
== 2.8.3-dev.15
== 2.8.4-dev2
== 2.8.6-dev11
== 2.8.1-dev.18
== 2.8.2-dev.24
== 2.8.2-pre.4
== 2.8.4-dev16
== 2.8.5-pre.3
== 2.8.5-dev.11
== 2.8.5-dev.8
== 2.8.3-dev.22
== 2.8.1-dev.21
== 2.8.5-dev.15
== 2.8.1-dev.3
== 2.8.4-pre.5
== 2.8.2-pre.7
== 2.8.1-dev.26
== 2.8.1-pre.3
== 2.8.5-dev.16
== 2.8.4-dev12
== 2.8.2-pre.2
== 2.8.2-pre.8
== 2.8.6-dev10
== 2.8.6-dev3
== 2.8.2-dev.25
== 2.8.4-dev18
== 2.8.1-dev.9
== 2.8.2-dev.15
== 2.8.5-dev.4
== 2.8.5-pre.4
== 2.8.4-dev7
== 2.8.1-dev.12
== 2.8.1-dev.11
== 2.8.2-dev.4
== 2.8.3-pre4
== 2.8.6-dev6
== 2.8.1-pre.11
== 2.8.6-dev13
== 2.8.2-dev.7
== 2.8.1-dev.23
== 2.8.1-dev.24
== 2.8.1-dev.6
== 2.8.1-pre.9
== 2.8.5-rel.1
== 2.8.4-dev15
== 2.8.3-pre3
== 2.8.3-dev.5
== 2.8.4-dev1
== 2.8.4-dev4
== 2.8.6-dev9
== 2.8.3-dev.14
== 2.8.4-pre.3
== 2.8.2-dev.10
== 2.8.2-dev.1
== 2.8.3-dev.20
== 2.8.5-dev.7
== 2.8.5-pre.2
== 2.8.3-dev.13
== 2.8.3-dev.8
== 2.8.6-rel2
== 2.8.5-dev.10
CVE-2008-4690
High
Oct 22, 2008
== 2.8.3-pre1
== 2.8.1-dev.5
== 2.8.5-dev.6
== 2.8.1-dev.20
== 2.8.2-dev.17
== 2.8.6-dev5
== 2.8.4-dev17
== 2.8.6-dev4
== 2.8.4-dev11
== 2.8.4-dev10
== 2.8.5-dev.3
== 2.8.1-dev.7
== 2.8.3-pre6
== 2.8.6-dev8
== 2.8.5-pre.1
== 2.8.2-dev.22
== 2.8.3-dev.11
== 2.8.4-pre.1
== 2.8.5-dev.9
== 2.8.1-rel.2
== 2.8.1-dev.10
== 2.8.3-dev.7
== 2.8.3-dev.17
== 2.8.1-dev.13
== 2.8.1-pre.5
== 2.8.4-dev5
== 2.8.4-pre.4
== 2.8.6-dev14
== 2.8.1-dev.15
== 2.8.3-rel1
== 2.8.3-pre7
== 2.8.1-pre.7
== 2.8.3-dev.10
== 2.8.2-pre.5
== 2.8.2-rel.1
== 2.8.2-dev.11
== 2.8.5-dev.13
== 2.8.2-dev.5
== 2.8.2-dev.26
== 2.8.1-dev.8
== 2.8.1-pre.4
== 2.8.5-dev.14
== 2.8.1-pre.10
== 2.8.1-dev.17
== 2.8.3-dev.6
== 2.8.2-dev.12
== 2.8.2-dev.8
== 2.8.4-dev3
== 2.8.4-dev21
== 2.8.2-dev.6
== 2.8.1-rel.1
== 2.8.6-dev12
== 2.8.6-dev2
== 2.8.4-pre.2
== 2.8.1-dev.27
== 2.8.1-dev.16
== 2.8.2-pre.1
== 2.8.1-dev.14
== 2.8.3-dev.4
== 2.8.5-dev.2
== 2.8.3-dev.1
== 2.8.2-dev.9
== 2.8.4-dev8
== 2.8.2-pre.9
== 2.8.2-dev.13
== 2.8.3-dev.23
== 2.8.3-dev.18
== 2.8.2-dev.14
== 2.8.2-dev.19
== 2.8.3-dev.12
== 2.8.2-pre.11
== 2.8.1-pre.1
== 2.8.3-dev.21
== 2.8.1-dev.2
== 2.8.3-pre8
== 2.8.1-dev.28
== 2.8.4-rel.1
== 2.8.1-pre.8
== 2.8.4-dev13
== 2.8.4-dev6
== 2.8.2-dev.3
== 2.8.3-pre2
== 2.8.2-pre.6
== 2.8.3-dev.2
== 2.8.2-dev.16
== 2.8.5-dev.5
== 2.8.6-dev7
== 2.8.1-pre.6
== 2.8.3-dev.16
== 2.8.3-dev.19
== 2.8.5-dev.1
== 2.8.4-dev14
== 2.8.5-dev.17
== 2.8.1-dev.4
== 2.8.1-dev.29
== 2.8.4-dev19
== 2.8.2-dev.20
== 2.8.1-pre.2
== 2.8.1-dev.1
== 2.8.4-dev9
== 2.8.1-dev.22
== 2.8.3-pre5
== 2.8.5-pre.5
== 2.8.6-dev1
== 2.8.5-dev.12
== 2.8.1-dev.19
== 2.8.3-dev.9
== 2.8.2-pre.10
== 2.8.2-dev.21
== 2.8.2-dev.23
== 2.8.2-pre.3
== 2.8.2-dev.2
== 2.8.2-dev.18
== 2.8.3-dev.3
== 2.8.4-dev20
== 2.8.3-dev.15
== 2.8.4-dev2
== 2.8.6-dev11
== 2.8.1-dev.18
== 2.8.2-dev.24
== 2.8.2-pre.4
== 2.8.4-dev16
== 2.8.5-pre.3
== 2.8.5-dev.11
== 2.8.5-dev.8
== 2.8.3-dev.22
== 2.8.1-dev.21
== 2.8.5-dev.15
<= 2.8.6
== 2.8.1-dev.3
== 2.8.4-pre.5
== 2.8.2-pre.7
== 2.8.1-dev.26
== 2.8.1-pre.3
== 2.8.5-dev.16
== 2.8.4-dev12
== 2.8.2-pre.2
== 2.8.2-pre.8
== 2.8.6-dev10
== 2.8.6-dev3
== 2.8.2-dev.25
== 2.8.4-dev18
== 2.8.1-dev.9
== 2.8.2-dev.15
== 2.8.5-dev.4
== 2.8.5-pre.4
== 2.8.4-dev7
== 2.8.1-dev.12
== 2.8.1-dev.11
== 2.8.2-dev.4
== 2.8.3-pre4
== 2.8.6-dev6
== 2.8.1-pre.11
== 2.8.6-dev13
== 2.8.2-dev.7
== 2.8.1-dev.23
== 2.8.1-dev.24
== 2.8.1-dev.6
== 2.8.1-pre.9
== 2.8.5-rel.1
== 2.8.4-dev15
== 2.8.3-pre3
== 2.8.3-dev.5
== 2.8.4-dev1
== 2.8.4-dev4
== 2.8.6-dev9
== 2.8.3-dev.14
== 2.8.4-pre.3
== 2.8.2-dev.10
== 2.8.2-dev.1
== 2.8.3-dev.20
== 2.8.5-dev.7
== 2.8.5-pre.2
== 2.8.3-dev.13
== 2.8.3-dev.8
== 2.8.5-dev.10
lynx_project / lynx
You can search for specific versions with
https://synscan.net/product/lynx/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2021-38165
Medium
Aug 7, 2021
<= 2.8.9
CVE-2014-5002
Low
Jan 10, 2018
< 1.0.0
CVE-2017-1000211
Medium
Nov 17, 2017
== 2.8.9-dev15
CVE-1999-1549
High
Nov 16, 1999
== 2.8
== 2.7
lynx
You can search for specific versions with
https://synscan.net/product/lynx/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2014-5002
Low
Jan 10, 2018
< 1.0.0
invisible-island / lynx
You can search for specific versions with
https://synscan.net/product/lynx/1.2.3
Title
Severity
Exploit
Date
Affected Version
CVE-2005-3120
Critical
Oct 17, 2005
<= 2.8.6