Vulnerability Database

With exploit

university_of_kansas / lynx

Title Severity Exploit Date Affected Version
CVE-2005-2929 High Nov 18, 2005 == 2.8.6
== 2.8.6_dev13
== 2.8.5
CVE-2004-1617 Medium Oct 18, 2004 == 2.8.4
== 2.8.3_pre5
== 2.8.5_dev5
== 2.7
== 2.8.4_rel1
== 2.8.1
== 2.8
== 2.8.3
== 2.8.5_dev8
== 2.8.2_rel1
== 2.8.5_dev3
== 2.8.3_rel1
== 2.8.5_dev2
== 2.8.5_dev4
== 2.8.3_dev22
== 2.8.5
CVE-2002-1405 Medium Feb 19, 2003 == 2.8.4
== 2.8.4_rel1
== 2.8.3
== 2.8.5_dev8
== 2.8.2_rel1
== 2.8.3_rel1
CVE-2000-0209 High Feb 27, 2000 == 2.7
== 2.8
== 2.8.3_dev22
CVE-1999-0817 High Sep 15, 1999 *
CVE-1999-0371 Low Feb 11, 1999 <= 2.7.1

lynx / lynx

Title Severity Exploit Date Affected Version
CVE-2016-9179 High Dec 22, 2016 *
CVE-2010-2810 Medium Aug 20, 2010 == 2.8.8-dev.2
== 2.8.8-dev.3
== 2.8.8-dev.1
== 2.8.8-dev.4
CVE-2006-7234 Low Oct 27, 2008 == 2.8.3-pre1
== 2.8.1-dev.5
<= 2.8.6
== 2.8.5-dev.6
== 2.8.1-dev.20
== 2.8.2-dev.17
== 2.8.6-dev5
== 2.8.4-dev17
== 2.8.6-dev4
== 2.8.4-dev11
== 2.8.4-dev10
== 2.8.5-dev.3
== 2.8.1-dev.7
== 2.8.3-pre6
== 2.8.6-dev8
== 2.8.5-pre.1
== 2.8.2-dev.22
== 2.8.3-dev.11
== 2.8.4-pre.1
== 2.8.5-dev.9
== 2.8.1-rel.2
== 2.8.1-dev.10
== 2.8.3-dev.7
== 2.8.3-dev.17
== 2.8.1-dev.13
== 2.8.1-pre.5
== 2.8.4-dev5
== 2.8.4-pre.4
== 2.8.6-dev14
== 2.8.1-dev.15
== 2.8.3-rel1
== 2.8.3-pre7
== 2.8.1-pre.7
== 2.8.3-dev.10
== 2.8.2-pre.5
== 2.8.2-rel.1
== 2.8.2-dev.11
== 2.8.5-dev.13
== 2.8.2-dev.5
== 2.8.2-dev.26
== 2.8.1-dev.8
== 2.8.1-pre.4
== 2.8.5-dev.14
== 2.8.1-pre.10
== 2.8.1-dev.17
== 2.8.3-dev.6
== 2.8.6-dev15
== 2.8.2-dev.12
== 2.8.2-dev.8
== 2.8.4-dev3
== 2.8.4-dev21
== 2.8.2-dev.6
== 2.8.1-rel.1
== 2.8.6-dev12
== 2.8.6-dev2
== 2.8.6-rel1
== 2.8.4-pre.2
== 2.8.1-dev.27
== 2.8.1-dev.16
== 2.8.2-pre.1
== 2.8.1-dev.14
== 2.8.3-dev.4
== 2.8.5-dev.2
== 2.8.3-dev.1
== 2.8.2-dev.9
== 2.8.4-dev8
== 2.8.2-pre.9
== 2.8.2-dev.13
== 2.8.3-dev.23
== 2.8.3-dev.18
== 2.8.2-dev.14
== 2.8.2-dev.19
== 2.8.3-dev.12
== 2.8.2-pre.11
== 2.8.1-pre.1
== 2.8.3-dev.21
== 2.8.1-dev.2
== 2.8.3-pre8
== 2.8.1-dev.28
== 2.8.4-rel.1
== 2.8.1-pre.8
== 2.8.4-dev13
== 2.8.4-dev6
== 2.8.2-dev.3
== 2.8.3-pre2
== 2.8.2-pre.6
== 2.8.3-dev.2
== 2.8.2-dev.16
== 2.8.5-dev.5
== 2.8.6-dev7
== 2.8.1-pre.6
== 2.8.3-dev.16
== 2.8.3-dev.19
== 2.8.5-dev.1
== 2.8.4-dev14
== 2.8.5-dev.17
== 2.8.1-dev.4
== 2.8.1-dev.29
== 2.8.4-dev19
== 2.8.2-dev.20
== 2.8.1-pre.2
== 2.8.1-dev.1
== 2.8.4-dev9
== 2.8.1-dev.22
== 2.8.3-pre5
== 2.8.5-pre.5
== 2.8.6-dev1
== 2.8.5-dev.12
== 2.8.1-dev.19
== 2.8.3-dev.9
== 2.8.2-pre.10
== 2.8.2-dev.21
== 2.8.2-dev.23
== 2.8.2-pre.3
== 2.8.2-dev.2
== 2.8.2-dev.18
== 2.8.3-dev.3
== 2.8.4-dev20
== 2.8.3-dev.15
== 2.8.4-dev2
== 2.8.6-dev11
== 2.8.1-dev.18
== 2.8.2-dev.24
== 2.8.2-pre.4
== 2.8.4-dev16
== 2.8.5-pre.3
== 2.8.5-dev.11
== 2.8.5-dev.8
== 2.8.3-dev.22
== 2.8.1-dev.21
== 2.8.5-dev.15
== 2.8.1-dev.3
== 2.8.4-pre.5
== 2.8.2-pre.7
== 2.8.1-dev.26
== 2.8.1-pre.3
== 2.8.5-dev.16
== 2.8.4-dev12
== 2.8.2-pre.2
== 2.8.2-pre.8
== 2.8.6-dev10
== 2.8.6-dev3
== 2.8.2-dev.25
== 2.8.4-dev18
== 2.8.1-dev.9
== 2.8.2-dev.15
== 2.8.5-dev.4
== 2.8.5-pre.4
== 2.8.4-dev7
== 2.8.1-dev.12
== 2.8.1-dev.11
== 2.8.2-dev.4
== 2.8.3-pre4
== 2.8.6-dev6
== 2.8.1-pre.11
== 2.8.6-dev13
== 2.8.2-dev.7
== 2.8.1-dev.23
== 2.8.1-dev.24
== 2.8.1-dev.6
== 2.8.1-pre.9
== 2.8.5-rel.1
== 2.8.4-dev15
== 2.8.3-pre3
== 2.8.3-dev.5
== 2.8.4-dev1
== 2.8.4-dev4
== 2.8.6-dev9
== 2.8.3-dev.14
== 2.8.4-pre.3
== 2.8.2-dev.10
== 2.8.2-dev.1
== 2.8.3-dev.20
== 2.8.5-dev.7
== 2.8.5-pre.2
== 2.8.3-dev.13
== 2.8.3-dev.8
== 2.8.6-rel2
== 2.8.5-dev.10
CVE-2008-4690 High Oct 22, 2008 == 2.8.3-pre1
== 2.8.1-dev.5
== 2.8.5-dev.6
== 2.8.1-dev.20
== 2.8.2-dev.17
== 2.8.6-dev5
== 2.8.4-dev17
== 2.8.6-dev4
== 2.8.4-dev11
== 2.8.4-dev10
== 2.8.5-dev.3
== 2.8.1-dev.7
== 2.8.3-pre6
== 2.8.6-dev8
== 2.8.5-pre.1
== 2.8.2-dev.22
== 2.8.3-dev.11
== 2.8.4-pre.1
== 2.8.5-dev.9
== 2.8.1-rel.2
== 2.8.1-dev.10
== 2.8.3-dev.7
== 2.8.3-dev.17
== 2.8.1-dev.13
== 2.8.1-pre.5
== 2.8.4-dev5
== 2.8.4-pre.4
== 2.8.6-dev14
== 2.8.1-dev.15
== 2.8.3-rel1
== 2.8.3-pre7
== 2.8.1-pre.7
== 2.8.3-dev.10
== 2.8.2-pre.5
== 2.8.2-rel.1
== 2.8.2-dev.11
== 2.8.5-dev.13
== 2.8.2-dev.5
== 2.8.2-dev.26
== 2.8.1-dev.8
== 2.8.1-pre.4
== 2.8.5-dev.14
== 2.8.1-pre.10
== 2.8.1-dev.17
== 2.8.3-dev.6
== 2.8.2-dev.12
== 2.8.2-dev.8
== 2.8.4-dev3
== 2.8.4-dev21
== 2.8.2-dev.6
== 2.8.1-rel.1
== 2.8.6-dev12
== 2.8.6-dev2
== 2.8.4-pre.2
== 2.8.1-dev.27
== 2.8.1-dev.16
== 2.8.2-pre.1
== 2.8.1-dev.14
== 2.8.3-dev.4
== 2.8.5-dev.2
== 2.8.3-dev.1
== 2.8.2-dev.9
== 2.8.4-dev8
== 2.8.2-pre.9
== 2.8.2-dev.13
== 2.8.3-dev.23
== 2.8.3-dev.18
== 2.8.2-dev.14
== 2.8.2-dev.19
== 2.8.3-dev.12
== 2.8.2-pre.11
== 2.8.1-pre.1
== 2.8.3-dev.21
== 2.8.1-dev.2
== 2.8.3-pre8
== 2.8.1-dev.28
== 2.8.4-rel.1
== 2.8.1-pre.8
== 2.8.4-dev13
== 2.8.4-dev6
== 2.8.2-dev.3
== 2.8.3-pre2
== 2.8.2-pre.6
== 2.8.3-dev.2
== 2.8.2-dev.16
== 2.8.5-dev.5
== 2.8.6-dev7
== 2.8.1-pre.6
== 2.8.3-dev.16
== 2.8.3-dev.19
== 2.8.5-dev.1
== 2.8.4-dev14
== 2.8.5-dev.17
== 2.8.1-dev.4
== 2.8.1-dev.29
== 2.8.4-dev19
== 2.8.2-dev.20
== 2.8.1-pre.2
== 2.8.1-dev.1
== 2.8.4-dev9
== 2.8.1-dev.22
== 2.8.3-pre5
== 2.8.5-pre.5
== 2.8.6-dev1
== 2.8.5-dev.12
== 2.8.1-dev.19
== 2.8.3-dev.9
== 2.8.2-pre.10
== 2.8.2-dev.21
== 2.8.2-dev.23
== 2.8.2-pre.3
== 2.8.2-dev.2
== 2.8.2-dev.18
== 2.8.3-dev.3
== 2.8.4-dev20
== 2.8.3-dev.15
== 2.8.4-dev2
== 2.8.6-dev11
== 2.8.1-dev.18
== 2.8.2-dev.24
== 2.8.2-pre.4
== 2.8.4-dev16
== 2.8.5-pre.3
== 2.8.5-dev.11
== 2.8.5-dev.8
== 2.8.3-dev.22
== 2.8.1-dev.21
== 2.8.5-dev.15
<= 2.8.6
== 2.8.1-dev.3
== 2.8.4-pre.5
== 2.8.2-pre.7
== 2.8.1-dev.26
== 2.8.1-pre.3
== 2.8.5-dev.16
== 2.8.4-dev12
== 2.8.2-pre.2
== 2.8.2-pre.8
== 2.8.6-dev10
== 2.8.6-dev3
== 2.8.2-dev.25
== 2.8.4-dev18
== 2.8.1-dev.9
== 2.8.2-dev.15
== 2.8.5-dev.4
== 2.8.5-pre.4
== 2.8.4-dev7
== 2.8.1-dev.12
== 2.8.1-dev.11
== 2.8.2-dev.4
== 2.8.3-pre4
== 2.8.6-dev6
== 2.8.1-pre.11
== 2.8.6-dev13
== 2.8.2-dev.7
== 2.8.1-dev.23
== 2.8.1-dev.24
== 2.8.1-dev.6
== 2.8.1-pre.9
== 2.8.5-rel.1
== 2.8.4-dev15
== 2.8.3-pre3
== 2.8.3-dev.5
== 2.8.4-dev1
== 2.8.4-dev4
== 2.8.6-dev9
== 2.8.3-dev.14
== 2.8.4-pre.3
== 2.8.2-dev.10
== 2.8.2-dev.1
== 2.8.3-dev.20
== 2.8.5-dev.7
== 2.8.5-pre.2
== 2.8.3-dev.13
== 2.8.3-dev.8
== 2.8.5-dev.10

lynx_project / lynx

Title Severity Exploit Date Affected Version
CVE-2021-38165 Medium Aug 7, 2021 <= 2.8.9
CVE-2014-5002 High Jan 10, 2018 < 1.0.0
CVE-2017-1000211 Medium Nov 17, 2017 == 2.8.9-dev15
CVE-1999-1549 High Nov 16, 1999 == 2.8
== 2.7

lynx

Title Severity Exploit Date Affected Version
CVE-2014-5002 High Jan 10, 2018 < 1.0.0

invisible-island / lynx

Title Severity Exploit Date Affected Version
CVE-2005-3120 Critical Oct 17, 2005 <= 2.8.6