CVE-2016-9179Improper Input Validation in Lynx

Severity
7.5HIGHNVD
EPSS
0.3%
top 49.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 22
Latest updateMay 17

Description

lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

🔴Vulnerability Details

3
GHSA
GHSA-r2wx-qjhc-7h6p: lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tr2022-05-17
OSV
lynx vulnerabilities2021-03-15
OSV
CVE-2016-9179: lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tr2016-12-22

📋Vendor Advisories

4
Ubuntu
Lynx vulnerabilities2021-03-15
Microsoft
It was found that Lynx doesn't parse the authority component of the URL correctly2016-12-13
Red Hat
lynx: Invalid URL parsing of pages containing '?'2016-11-03
Debian
CVE-2016-9179: lynx - lynx: It was found that Lynx doesn't parse the authority component of the URL co...2016

💬Community

2
Bugzilla
CVE-2016-9179 lynx: Invalid URL parsing of pages containing '?' [fedora-all]2016-11-04
Bugzilla
CVE-2016-9179 lynx: Invalid URL parsing of pages containing '?'2016-11-04