Lynx Internal URL Verification Code Execution

Medium Nessus Network Monitor Plugin ID 1739


The remote host is using Lynx as a web browser.


The remote host is using Lynx as a web browser. The version used is vulnerable to a bug which may allow a rogue web site to be considered as a local page. An attacker may eventually use this flaw to execute arbitrary code on this host, with the privileges of the user running lynx.


No solution is known at this time.

Plugin Details

Severity: Medium

ID: 1739

File Name: 1739.prm

Family: Web Clients

Published: 2004/08/20

Modified: 2016/01/21

Dependencies: 1735, 8314

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 4.6


Temporal Vector: CVSS3#E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:lynx:lynx

Reference Information

CVE: CVE-1999-1549

BID: 804