Search criteria
12 vulnerabilities found for links by twibright
FKIE_CVE-2012-6709
Vulnerability from fkie_nvd - Published: 2018-02-23 17:29 - Updated: 2024-11-21 01:46
Severity ?
Summary
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658 | Issue Tracking, Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=881399 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=881399 | Issue Tracking, Patch |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elinks:elinks:0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1B88F36D-25D4-472F-8C1A-A2F6F61EEEC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twibright:links:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B6386364-E7D9-4ED8-8073-0E6267162BC0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation."
},
{
"lang": "es",
"value": "ELinks 0.12 y Twibright Links 2.3 tienen una falta de validaci\u00f3n de certificados SSL."
}
],
"id": "CVE-2012-6709",
"lastModified": "2024-11-21T01:46:43.680",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-02-23T17:29:00.207",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-295"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-11114
Vulnerability from fkie_nvd - Published: 2017-07-31 13:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://seclists.org/fulldisclosure/2017/Jul/76 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2017/Jul/76 | Mailing List, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twibright:links:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "358F0722-371B-43F7-9038-E61FE5F73BC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file."
},
{
"lang": "es",
"value": "La funci\u00f3n put_chars en el archivo html_r.c en Twibright Links versi\u00f3n 2.14, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (lectura excesiva del b\u00fafer) por medio de un archivo HTML creado."
}
],
"id": "CVE-2017-11114",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-07-31T13:29:00.317",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-6050
Vulnerability from fkie_nvd - Published: 2013-12-07 20:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twibright:links:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75636EB1-8902-4BD8-9346-729A67DC3EA7",
"versionEndIncluding": "2.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.7:pre1:*:*:*:*:*:*",
"matchCriteriaId": "CBF1C76F-DDB3-430E-99AC-2EAA474C41B1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables."
},
{
"lang": "es",
"value": "Desbordamiento de enteros en Links anterior a la versi\u00f3n 2.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de tablas HTML."
}
],
"id": "CVE-2013-6050",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-12-07T20:55:02.587",
"references": [
{
"source": "cve@mitre.org",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2013/dsa-2807"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-189"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2008-3329
Vulnerability from fkie_nvd - Published: 2008-07-27 22:41 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs."
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twibright:links:*:pre37:*:*:*:*:*:*",
"matchCriteriaId": "4A1B253B-922F-4B8E-ACE5-ED3BD3BCBA2E",
"versionEndIncluding": "2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.80:*:*:*:*:*:*:*",
"matchCriteriaId": "FF195B91-91A2-4F4F-A992-E2DAA7EF2484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.81:pre1:*:*:*:*:*:*",
"matchCriteriaId": "4F322232-35BE-433D-A277-CF2B3C762D4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.81:pre2:*:*:*:*:*:*",
"matchCriteriaId": "D107180E-FB4E-425C-B152-AA3CDC433822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.81:pre3:*:*:*:*:*:*",
"matchCriteriaId": "412B0235-3D71-4D8F-9F82-C61CCD3E6611",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "A0B1C610-98E5-4AA4-BC19-F2DDB47A735B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.90:pre1:*:*:*:*:*:*",
"matchCriteriaId": "843845B4-A8FD-4D8B-9B9A-9E220F9FF651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.90:pre2:*:*:*:*:*:*",
"matchCriteriaId": "10D64D7C-A671-4A9B-82F6-5E61ADB96F6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.90:pre3:*:*:*:*:*:*",
"matchCriteriaId": "88D81AF9-401F-4768-8E20-D536FD904FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.91:*:*:*:*:*:*:*",
"matchCriteriaId": "022CAC33-2D4D-46DC-9178-9DF84520D595",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.92:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A10725-6345-43A6-B49A-ADA50064BEAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.93:*:*:*:*:*:*:*",
"matchCriteriaId": "8DEED69D-C9C6-4808-BA31-2767CB16791A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.93:pre1:*:*:*:*:*:*",
"matchCriteriaId": "A6468A33-A0B6-4990-857A-DFC0ED310707",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.93:pre2:*:*:*:*:*:*",
"matchCriteriaId": "A9537ECD-C024-4AEC-B548-0AD112C3C10A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.93:pre3:*:*:*:*:*:*",
"matchCriteriaId": "EB44941E-D99F-4E79-AB15-D60BB9F80C88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.93:pre4:*:*:*:*:*:*",
"matchCriteriaId": "90B02CAF-DED3-4FCE-8209-0D0F978F5784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:*:*:*:*:*:*:*",
"matchCriteriaId": "4B04C997-5D7A-49BA-ACF8-2E31EDBF2AAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre1:*:*:*:*:*:*",
"matchCriteriaId": "1E86D214-B72A-4A49-ABC7-4543D1C53315",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre2:*:*:*:*:*:*",
"matchCriteriaId": "876B3FD8-B2FA-4020-9665-623CA7D31B27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre3:*:*:*:*:*:*",
"matchCriteriaId": "46BB3C8F-A25A-48AB-9250-403E48DE6FCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre4:*:*:*:*:*:*",
"matchCriteriaId": "5A501F83-3E0B-4CD5-9B30-2B8788DE8065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre5:*:*:*:*:*:*",
"matchCriteriaId": "4941D28F-A207-4B60-A247-723BD25C818F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre6:*:*:*:*:*:*",
"matchCriteriaId": "28E1C00D-2212-461E-9414-8940FD0FB7EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre7:*:*:*:*:*:*",
"matchCriteriaId": "806F721C-E36F-4421-A7CE-AE3719CF19E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre8:*:*:*:*:*:*",
"matchCriteriaId": "A3BE35D1-9A51-44F2-8B70-E66CC1CCEFB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.94:pre9:*:*:*:*:*:*",
"matchCriteriaId": "D404B192-51AC-4F9A-A023-AA1CCB3A32DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.95:*:*:*:*:*:*:*",
"matchCriteriaId": "8F8E5AFD-A00F-4227-9D38-9F8D47A7347F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:*:*:*:*:*:*:*",
"matchCriteriaId": "80AF9E68-F8C8-461E-9D05-419425B70AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre1:*:*:*:*:*:*",
"matchCriteriaId": "EAFF3141-EA06-4CD6-B6DC-41FF0FA43C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre2:*:*:*:*:*:*",
"matchCriteriaId": "14D2FFE6-5009-4511-8DAC-E44CA5379C90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre3:*:*:*:*:*:*",
"matchCriteriaId": "74556BD5-9661-460D-8A58-E1302A77136B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre4:*:*:*:*:*:*",
"matchCriteriaId": "8E5D097E-B5D9-4637-BAFD-0E815722E892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre5:*:*:*:*:*:*",
"matchCriteriaId": "98D74773-24AC-4639-B38F-10AE44DFF9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre6:*:*:*:*:*:*",
"matchCriteriaId": "8B0C7D2F-953D-4DD9-AEC7-69C0A3896211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre7:*:*:*:*:*:*",
"matchCriteriaId": "A4E164F6-D938-445B-8C16-13B58DCF8CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.96:pre8:*:*:*:*:*:*",
"matchCriteriaId": "0D931092-DA6C-4C7D-AF2B-C8D0A1F899DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:*:*:*:*:*:*:*",
"matchCriteriaId": "407C8E07-D1C5-4BB4-866F-D2F15BE7D20B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre1:*:*:*:*:*:*",
"matchCriteriaId": "AAB4802B-AC06-4462-8D2B-305530B52DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre10:*:*:*:*:*:*",
"matchCriteriaId": "676B44A3-683A-4EAC-87D4-2DE0F0FFE78F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre11:*:*:*:*:*:*",
"matchCriteriaId": "0CAC243F-FEA9-4AD7-BE39-161084C0EFEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre12:*:*:*:*:*:*",
"matchCriteriaId": "76012999-0DC3-4B9C-BF7E-4D96E6DB90FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre2:*:*:*:*:*:*",
"matchCriteriaId": "B16BBDAB-A2D0-4D3D-9259-72E4785469E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre3:*:*:*:*:*:*",
"matchCriteriaId": "8403C9E9-2B4D-47EE-818D-260EBA098A1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre4:*:*:*:*:*:*",
"matchCriteriaId": "6B7D2205-DED9-433E-9B2E-74808BEAC2C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre5:*:*:*:*:*:*",
"matchCriteriaId": "D6B33158-AB7A-4678-8C2E-4896BABBF2EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre6:*:*:*:*:*:*",
"matchCriteriaId": "5D936E3F-615B-455C-BFEB-356F513F7767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre7:*:*:*:*:*:*",
"matchCriteriaId": "06989DF1-9009-4D61-AA41-D0D8A3A0DF71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre8:*:*:*:*:*:*",
"matchCriteriaId": "775DCFFC-6BB9-4ECF-8B82-3ACC44ECA528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:0.97:pre9:*:*:*:*:*:*",
"matchCriteriaId": "D1954BBF-D90A-4A3D-9A4B-813BD8F3F3EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B9D819DE-BD2D-4D9C-9DF8-C281A6C9A493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre1:*:*:*:*:*:*",
"matchCriteriaId": "63F669F8-4160-4035-8969-B767C196932F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre2:*:*:*:*:*:*",
"matchCriteriaId": "BE432458-E522-4E32-963D-0C02118D40BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre3:*:*:*:*:*:*",
"matchCriteriaId": "36E3F04C-CEF1-4E14-A502-0231078CEA26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre4:*:*:*:*:*:*",
"matchCriteriaId": "1A86732E-684B-4DA5-9329-6F4CF7F295DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre5:*:*:*:*:*:*",
"matchCriteriaId": "ED0CC5D9-6945-4F2D-A4B6-64A26279A95D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.0:pre6:*:*:*:*:*:*",
"matchCriteriaId": "CE6E984A-288D-4E43-8148-99704D370A2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre1:*:*:*:*:*:*",
"matchCriteriaId": "A655A2FF-373A-4ACA-B437-3FDBB3E8DD11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre10:*:*:*:*:*:*",
"matchCriteriaId": "CF817275-6092-44CF-9220-5D87CBB787D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre11:*:*:*:*:*:*",
"matchCriteriaId": "B4580F35-9AF5-4663-99CD-4B05A9A1F89B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre12:*:*:*:*:*:*",
"matchCriteriaId": "11D9F13A-E1F3-42D6-AB38-D7C795D88F0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre13:*:*:*:*:*:*",
"matchCriteriaId": "CF329113-1508-4BE3-B487-CE39E6389E9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre14:*:*:*:*:*:*",
"matchCriteriaId": "91E4CB53-7045-49DA-8C32-3BA602EBBFDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre15:*:*:*:*:*:*",
"matchCriteriaId": "3A9BB040-E84A-4023-82C8-25379704AA8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre16:*:*:*:*:*:*",
"matchCriteriaId": "5FD9ECB3-F914-473C-896E-06E583033524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre17:*:*:*:*:*:*",
"matchCriteriaId": "4552C57E-2A52-44F2-B854-6FDAFB86E842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre18:*:*:*:*:*:*",
"matchCriteriaId": "C7ED6DC2-0899-4BA9-BB0A-47592A762E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre19:*:*:*:*:*:*",
"matchCriteriaId": "B333E6D4-7C8E-4138-B8EC-CF21A6091492",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre2:*:*:*:*:*:*",
"matchCriteriaId": "29C8455D-82EE-4CA8-9759-4376B4B19843",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre20:*:*:*:*:*:*",
"matchCriteriaId": "51D54E59-EE5B-4E3E-B10E-266766E6F83C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre21:*:*:*:*:*:*",
"matchCriteriaId": "C5430B06-AE8D-4A74-9420-F8C058351399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre22:*:*:*:*:*:*",
"matchCriteriaId": "69230FEE-CC08-4A99-A3DE-C229BE9C284A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre23:*:*:*:*:*:*",
"matchCriteriaId": "B1553B4B-E1DE-4C93-A50A-47F3CF5545C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre24:*:*:*:*:*:*",
"matchCriteriaId": "E774201F-F5EF-4FBF-99E1-F7A9F212097F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre25:*:*:*:*:*:*",
"matchCriteriaId": "28D6A7FC-FF71-4DEC-B17F-5F02D8E60F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre26:*:*:*:*:*:*",
"matchCriteriaId": "F40AA6FA-4CE2-4BDB-936C-D5989A3084C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre27:*:*:*:*:*:*",
"matchCriteriaId": "42810358-883A-447D-B361-248123206EB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre28:*:*:*:*:*:*",
"matchCriteriaId": "0ACBB461-5B67-4B56-81B6-A8C1A14D9288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre29:*:*:*:*:*:*",
"matchCriteriaId": "F1764B0D-0349-4050-B4BB-BDEC217A4E15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre3:*:*:*:*:*:*",
"matchCriteriaId": "66D2DBDE-50E6-4783-94B7-1BAA708C5A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre30:*:*:*:*:*:*",
"matchCriteriaId": "DAF29117-7475-49BD-8F93-0E5BFC2BC153",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre31:*:*:*:*:*:*",
"matchCriteriaId": "D2081093-CA04-46FB-BAF9-A1D1F007B877",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre32:*:*:*:*:*:*",
"matchCriteriaId": "4F488C12-3BBE-4967-9F20-25A8DBD00B93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre33:*:*:*:*:*:*",
"matchCriteriaId": "AE397782-FE5A-41F7-9A97-70786401C7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre34:*:*:*:*:*:*",
"matchCriteriaId": "7E037B11-C65E-4589-8887-AB3FFE342B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre35:*:*:*:*:*:*",
"matchCriteriaId": "78F25DDD-2137-48ED-8C8F-809E2BBBE5BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre36:*:*:*:*:*:*",
"matchCriteriaId": "B66BAA9D-E991-4275-B5F1-23072E4E0C41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre4:*:*:*:*:*:*",
"matchCriteriaId": "0FE461BB-D42D-49BA-B597-9D7E66EE0DE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre5:*:*:*:*:*:*",
"matchCriteriaId": "B383FD05-4673-4DB1-B9D1-620B6DE8F6AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre6:*:*:*:*:*:*",
"matchCriteriaId": "28B0DBE7-96FA-4FBF-9036-D09F9F71AC18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre7:*:*:*:*:*:*",
"matchCriteriaId": "2986E744-9B44-401E-AFF8-81459FC46A6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre8:*:*:*:*:*:*",
"matchCriteriaId": "806FF4F0-AEF1-42B5-A6F3-F997E0217F22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:twibright:links:2.1:pre9:*:*:*:*:*:*",
"matchCriteriaId": "EA160EB2-1670-455C-99AA-A85227B078D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Links before 2.1, when \"only proxies\" is enabled, has unknown impact and attack vectors related to providing \"URLs to external programs.\""
},
{
"lang": "es",
"value": "Vulnerabilidad no especificada en Links anterior a 2.1, cuando la opci\u00f3n \"only proxies\" (solo proxies) est\u00e1 activada, tiene un impacto y vectores de ataques desconocidos relacionado con que proporciona \"URLs a programas externos\"."
}
],
"id": "CVE-2008-3329",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2008-07-27T22:41:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/30422"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/30422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Not vulnerable. This issue did not affect the versions of links as shipped with Red Hat Enterprise Linux 2.1, and versions of elinks as shipped with Red Hat Enterprise Linux 3, 4, or 5. Versions of links / elinks shipped do not support \u0026quot;only proxies\u0026quot; feature.",
"lastModified": "2008-11-13T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2012-6709 (GCVE-0-2012-6709)
Vulnerability from cvelistv5 – Published: 2018-02-23 17:00 – Updated: 2024-09-16 20:43
VLAI?
Summary
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:02.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-23T17:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=881399",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6709",
"datePublished": "2018-02-23T17:00:00Z",
"dateReserved": "2018-02-23T00:00:00Z",
"dateUpdated": "2024-09-16T20:43:12.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-11114 (GCVE-0-2017-11114)
Vulnerability from cvelistv5 – Published: 2017-07-31 13:00 – Updated: 2024-08-05 17:57
VLAI?
Summary
The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:57:57.663Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-07-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-31T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-11114",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://seclists.org/fulldisclosure/2017/Jul/76",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-11114",
"datePublished": "2017-07-31T13:00:00",
"dateReserved": "2017-07-09T00:00:00",
"dateUpdated": "2024-08-05T17:57:57.663Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-6050 (GCVE-0-2013-6050)
Vulnerability from cvelistv5 – Published: 2013-12-07 20:00 – Updated: 2024-08-06 17:29
VLAI?
Summary
Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:29:42.987Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2807",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://links.twibright.com/download/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-11-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-12-07T19:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-2807",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://links.twibright.com/download/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-6050",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2807",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"name": "http://links.twibright.com/download/ChangeLog",
"refsource": "MISC",
"url": "http://links.twibright.com/download/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-6050",
"datePublished": "2013-12-07T20:00:00",
"dateReserved": "2013-10-08T00:00:00",
"dateUpdated": "2024-08-06T17:29:42.987Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3329 (GCVE-0-2008-3329)
Vulnerability from cvelistv5 – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.826Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30422"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Links before 2.1, when \"only proxies\" is enabled, has unknown impact and attack vectors related to providing \"URLs to external programs.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30422"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Links before 2.1, when \"only proxies\" is enabled, has unknown impact and attack vectors related to providing \"URLs to external programs.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://links.twibright.com/download/ChangeLog",
"refsource": "CONFIRM",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30422"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3329",
"datePublished": "2008-07-27T22:00:00",
"dateReserved": "2008-07-27T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.826Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-6709 (GCVE-0-2012-6709)
Vulnerability from nvd – Published: 2018-02-23 17:00 – Updated: 2024-09-16 20:43
VLAI?
Summary
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:36:02.018Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-02-23T17:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2012-6709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=881399",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=881399"
},
{
"name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658",
"refsource": "MISC",
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=694658"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2012-6709",
"datePublished": "2018-02-23T17:00:00Z",
"dateReserved": "2018-02-23T00:00:00Z",
"dateUpdated": "2024-09-16T20:43:12.705Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-11114 (GCVE-0-2017-11114)
Vulnerability from nvd – Published: 2017-07-31 13:00 – Updated: 2024-08-05 17:57
VLAI?
Summary
The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:57:57.663Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-07-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-31T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-11114",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The put_chars function in html_r.c in Twibright Links 2.14 allows remote attackers to cause a denial of service (buffer over-read) via a crafted HTML file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://seclists.org/fulldisclosure/2017/Jul/76",
"refsource": "MISC",
"url": "http://seclists.org/fulldisclosure/2017/Jul/76"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-11114",
"datePublished": "2017-07-31T13:00:00",
"dateReserved": "2017-07-09T00:00:00",
"dateUpdated": "2024-08-05T17:57:57.663Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-6050 (GCVE-0-2013-6050)
Vulnerability from nvd – Published: 2013-12-07 20:00 – Updated: 2024-08-06 17:29
VLAI?
Summary
Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T17:29:42.987Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-2807",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://links.twibright.com/download/ChangeLog"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-11-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-12-07T19:57:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-2807",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://links.twibright.com/download/ChangeLog"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-6050",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Integer overflow in Links before 2.8 allows remote attackers to cause a denial of service (crash) via crafted HTML tables."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-2807",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2013/dsa-2807"
},
{
"name": "http://links.twibright.com/download/ChangeLog",
"refsource": "MISC",
"url": "http://links.twibright.com/download/ChangeLog"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-6050",
"datePublished": "2013-12-07T20:00:00",
"dateReserved": "2013-10-08T00:00:00",
"dateUpdated": "2024-08-06T17:29:42.987Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2008-3329 (GCVE-0-2008-3329)
Vulnerability from nvd – Published: 2008-07-27 22:00 – Updated: 2024-08-07 09:37
VLAI?
Summary
Unspecified vulnerability in Links before 2.1, when "only proxies" is enabled, has unknown impact and attack vectors related to providing "URLs to external programs."
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T09:37:26.826Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/30422"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2008-07-02T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in Links before 2.1, when \"only proxies\" is enabled, has unknown impact and attack vectors related to providing \"URLs to external programs.\""
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T12:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/30422"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2008-3329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in Links before 2.1, when \"only proxies\" is enabled, has unknown impact and attack vectors related to providing \"URLs to external programs.\""
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://links.twibright.com/download/ChangeLog",
"refsource": "CONFIRM",
"url": "http://links.twibright.com/download/ChangeLog"
},
{
"name": "links-onlyproxies-unspecified(44035)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44035"
},
{
"name": "30422",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/30422"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2008-3329",
"datePublished": "2008-07-27T22:00:00",
"dateReserved": "2008-07-27T00:00:00",
"dateUpdated": "2024-08-07T09:37:26.826Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}