Ulf Hรคrnhammar discovered buffer overflow in lynx, a text-mode browser for the WWW that can be remotely exploited, leading to arbitrary code execution. Upgrade lynx package now
Reporter | Title | Published | Views | Family All 45 |
---|---|---|---|---|
securityvulns | [USN-206-1] Lynx vulnerability | 19 Oct 200500:00 | โ | securityvulns |
OSV | lynx-ssl - buffer overflow | 27 Oct 200500:00 | โ | osv |
OSV | Red Hat Security Advisory: lynx security update | 15 Sep 202415:51 | โ | osv |
OSV | lynx - buffer overflow | 27 Oct 200500:00 | โ | osv |
OSV | lynx-cur - several vulnerabilities | 1 Jun 200600:00 | โ | osv |
OpenVAS | Debian: Security Advisory (DSA-876-1) | 17 Jan 200800:00 | โ | openvas |
OpenVAS | Slackware Advisory SSA:2005-310-03 lynx | 11 Sep 201200:00 | โ | openvas |
OpenVAS | FreeBSD Ports: lynx | 4 Sep 200800:00 | โ | openvas |
OpenVAS | Slackware: Security Advisory (SSA:2005-310-03) | 10 Sep 201200:00 | โ | openvas |
OpenVAS | Debian Security Advisory DSA 876-1 (lynx-ssl) | 17 Jan 200800:00 | โ | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3.1 | ia64 | lynx | 2.8.5-2sarge1 | lynx_2.8.5-2sarge1_ia64.deb |
Debian | 3.1 | amd64 | lynx-cur | 2.8.6-9sarge1 | lynx-cur_2.8.6-9sarge1_amd64.deb |
Debian | 3.1 | alpha | lynx | 2.8.5-2sarge1 | lynx_2.8.5-2sarge1_alpha.deb |
Debian | 3 | powerpc | lynx | 2.8.4.1b-3.3 | lynx_2.8.4.1b-3.3_powerpc.deb |
Debian | 3.1 | m68k | lynx-cur | 2.8.6-9sarge1 | lynx-cur_2.8.6-9sarge1_m68k.deb |
Debian | 3 | mipsel | lynx | 2.8.4.1b-3.3 | lynx_2.8.4.1b-3.3_mipsel.deb |
Debian | 3.1 | alpha | lynx-cur | 2.8.6-9sarge1 | lynx-cur_2.8.6-9sarge1_alpha.deb |
Debian | 3.1 | all | lynx-cur | 2.8.6-9sarge1 | lynx-cur_2.8.6-9sarge1_all.deb |
Debian | 3 | ia64 | lynx-cur | 2.8.5-2.5woody1 | lynx-cur_2.8.5-2.5woody1_ia64.deb |
Debian | 3 | mipsel | lynx-cur | 2.8.5-2.5woody1 | lynx-cur_2.8.5-2.5woody1_mipsel.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo