CVE-2012-6709
- EPSS 0.19%
- Veröffentlicht 23.02.2018 17:29:00
- Zuletzt bearbeitet 21.11.2024 01:46:43
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
CVE-2012-4545
- EPSS 0.47%
- Veröffentlicht 03.01.2013 01:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
The http_negotiate_create_context function in protocol/http/http_negotiate.c in ELinks 0.12 before 0.12pre6, when using HTTP Negotiate or GSS-Negotiate authentication, delegates user credentials through GSSAPI, which allows remote servers to authenti...
CVE-2008-7224
- EPSS 0.93%
- Veröffentlicht 14.09.2009 14:30:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Buffer overflow in entity_cache in ELinks before 0.11.4rc0 allows remote attackers to cause a denial of service (crash) via a crafted link.
CVE-2007-5034
- EPSS 2.15%
- Veröffentlicht 21.09.2007 20:17:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by ...
CVE-2007-2027
- EPSS 0.28%
- Veröffentlicht 13.04.2007 18:19:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Untrusted search path vulnerability in the add_filename_to_string function in intl/gettext/loadmsgcat.c for Elinks 0.11.1 allows local users to cause Elinks to use an untrusted gettext message catalog (.po file) in a "../po" directory, which can be l...
CVE-2006-5925
- EPSS 20.51%
- Veröffentlicht 15.11.2006 19:07:00
- Zuletzt bearbeitet 09.04.2025 00:30:58
Links web browser 1.00pre12 and Elinks 0.9.2 with smbclient installed allows remote attackers to execute arbitrary code via shell metacharacters in an smb:// URI, as demonstrated by using PUT and GET statements.
- EPSS 14.08%
- Veröffentlicht 19.02.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
CRLF injection vulnerability in Lynx 2.8.4 and earlier allows remote attackers to inject false HTTP headers into an HTTP request that is provided on the command line, via a URL containing encoded carriage return, line feed, and other whitespace chara...