Total vulnerabilities in the database
Lynx 2.8.5, and other versions before 2.8.6dev.15, allows remote attackers to execute arbitrary commands via (1) lynxcgi:, (2) lynxexec, and (3) lynxprog links, which are not properly restricted in the default configuration in some environments.
Software | From | Fixed in |
---|---|---|
university_of_kansas / lynx | 2.8.6 | 2.8.6.x |
university_of_kansas / lynx | 2.8.6_dev13 | 2.8.6_dev13.x |
university_of_kansas / lynx | 2.8.5 | 2.8.5.x |