CVE-2016-9179 — Improper Input Validation in Lynx
Severity
7.5HIGHNVD
EPSS
0.3%
top 49.05%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22
Latest updateMay 17
Description
lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tricked into connecting to a different host.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages3 packages
🔴Vulnerability Details
3GHSA▶
GHSA-r2wx-qjhc-7h6p: lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tr↗2022-05-17
OSV▶
CVE-2016-9179: lynx: It was found that Lynx doesn't parse the authority component of the URL correctly when the host name part ends with '?', and could instead be tr↗2016-12-22
📋Vendor Advisories
4Microsoft
▶
Debian▶
CVE-2016-9179: lynx - lynx: It was found that Lynx doesn't parse the authority component of the URL co...↗2016