Security update for text-based Web browser Lyn
Reporter | Title | Published | Views | Family All 42 |
---|---|---|---|---|
![]() | [SECURITY] Fedora 34 Update: lynx-2.8.9-13.fc34 | 8 Sep 202115:07 | – | fedora |
![]() | [SECURITY] Fedora 33 Update: lynx-2.8.9-13.fc33 | 20 Sep 202113:34 | – | fedora |
![]() | [SECURITY] Fedora 35 Update: lynx-2.8.9-13.fc35 | 24 Sep 202120:41 | – | fedora |
![]() | lynx - security update | 10 Aug 202100:00 | – | osv |
![]() | RHSA-2022:2129 Red Hat Security Advisory: lynx security update | 13 Sep 202417:36 | – | osv |
![]() | CVE-2021-38165 | 7 Aug 202118:15 | – | osv |
![]() | lynx - security update | 9 Aug 202100:00 | – | osv |
![]() | Moderate: lynx security update | 10 May 202206:57 | – | osv |
![]() | lynx vulnerabilities | 15 Mar 202121:24 | – | osv |
![]() | CVE-2021-38165 | 18 Aug 202109:48 | – | redhatcve |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | s390x | lynx-debugsource | 2.8.9-4.el8 | lynx-debugsource-2.8.9-4.el8.s390x.rpm |
RedHat | 8 | x86_64 | lynx-debugsource | 2.8.9-4.el8 | lynx-debugsource-2.8.9-4.el8.x86_64.rpm |
RedHat | 8 | x86_64 | lynx-debuginfo | 2.8.9-4.el8 | lynx-debuginfo-2.8.9-4.el8.x86_64.rpm |
RedHat | 8 | s390x | lynx-debuginfo | 2.8.9-4.el8 | lynx-debuginfo-2.8.9-4.el8.s390x.rpm |
RedHat | 8 | ppc64le | lynx-debugsource | 2.8.9-4.el8 | lynx-debugsource-2.8.9-4.el8.ppc64le.rpm |
RedHat | 8 | aarch64 | lynx-debuginfo | 2.8.9-4.el8 | lynx-debuginfo-2.8.9-4.el8.aarch64.rpm |
RedHat | 8 | ppc64le | lynx-debuginfo | 2.8.9-4.el8 | lynx-debuginfo-2.8.9-4.el8.ppc64le.rpm |
RedHat | 8 | aarch64 | lynx-debugsource | 2.8.9-4.el8 | lynx-debugsource-2.8.9-4.el8.aarch64.rpm |
RedHat | 8 | s390x | lynx | 2.8.9-4.el8 | lynx-2.8.9-4.el8.s390x.rpm |
RedHat | 8 | x86_64 | lynx | 2.8.9-4.el8 | lynx-2.8.9-4.el8.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo