Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wget vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2010-2252
GNU Wget 1.12 and previous versions uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by ...
Gnu Wget 1.8.2
Gnu Wget 1.8.1
Gnu Wget 1.11.3
Gnu Wget 1.11.2
Gnu Wget 1.8
Gnu Wget 1.7.1
Gnu Wget 1.11.1
Gnu Wget 1.11
Gnu Wget 1.9
Gnu Wget 1.5.3
Gnu Wget 1.11.4
Gnu Wget 1.9.1
Gnu Wget
Gnu Wget 1.7
Gnu Wget 1.6
Gnu Wget 1.10.2
Gnu Wget 1.10.1
Gnu Wget 1.10
6.8
CVSSv2
CVE-2009-3490
GNU Wget prior to 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Cert...
Gnu Wget 1.10.1
Gnu Wget 1.10.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.11.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.11.2
Gnu Wget 1.11.3
Gnu Wget 1.10
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.7
Gnu Wget 1.7.1
Gnu Wget 1.11
Gnu Wget
5
CVSSv2
CVE-2006-6719
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote malicious users to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
Gnu Wget 1.7
Gnu Wget 1.7.1
Gnu Wget 1.10.1
Gnu Wget 1.10.2
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.9.1
Gnu Wget 1.10
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
2.6
CVSSv2
CVE-2004-2014
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.
Gnu Wget 1.6
Gnu Wget 1.7
Gnu Wget 1.5.3
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.7.1
Gnu Wget 1.8
1 EDB exploit
5
CVSSv2
CVE-2004-1488
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
5
CVSSv2
CVE-2004-1487
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
5
CVSSv2
CVE-2002-1344
Directory traversal vulnerability in wget prior to 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.8.2
Sun Cobalt Raq Xtr
Gnu Wget 1.7
Gnu Wget 1.7.1
7.5
CVSSv2
CVE-2005-3185
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Libcurl Libcurl 7.13.2
Wget Wget 1.10
Curl Curl 7.13.2
7.5
CVSSv2
CVE-2019-5953
Buffer overflow in GNU Wget 1.20.1 and previous versions allows remote malicious users to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
Gnu Wget
4.3
CVSSv2
CVE-2017-6508
CRLF injection vulnerability in the url_parse function in url.c in Wget up to and including 1.19.1 allows remote malicious users to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
Gnu Wget
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27975
CVE-2024-2961
CVE-2024-20380
XML injection
HTML injection
CVE-2024-29204
CVE-2023-51795
memory leak
CVE-2024-3470
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »