Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wget vulnerabilities and exploits
(subscribe to this query)
5.1
CVSSv2
CVE-2006-2550
perlpodder prior to 0.5 allows remote malicious users to execute arbitrary code via shell metacharacters in the URL of a podcast, which are executed when saving the URL to a log file. NOTE: the wget vector is already covered by CVE-2006-2548.
Perlpodder Perlpodder 0.3
Perlpodder Perlpodder
Perlpodder Perlpodder 0.2
7.5
CVSSv2
CVE-2005-3185
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Libcurl Libcurl 7.13.2
Wget Wget 1.10
Curl Curl 7.13.2
2.1
CVSSv2
CVE-2005-1879
LutelWall 0.97 and previous versions allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
Lutel Lutelwall
2.1
CVSSv2
CVE-2005-1880
everybuddy 0.4.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
Everybuddy Everybuddy
5
CVSSv2
CVE-2004-1487
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
5
CVSSv2
CVE-2004-1488
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
2.6
CVSSv2
CVE-2004-2014
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.
Gnu Wget 1.6
Gnu Wget 1.7
Gnu Wget 1.5.3
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.7.1
Gnu Wget 1.8
1 EDB exploit
7.5
CVSSv2
CVE-2002-1565
Buffer overflow in url_filename function for wget 1.8.1 allows malicious users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Immunix Immunix 7
5
CVSSv2
CVE-2002-1344
Directory traversal vulnerability in wget prior to 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.8.2
Sun Cobalt Raq Xtr
Gnu Wget 1.7
Gnu Wget 1.7.1
7.5
CVSSv2
CVE-2001-0849
viralator CGI script in Viralator 0.9pre1 and previous versions allows remote malicious users to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget.
Duncan Hall Viralator 0.7
Duncan Hall Viralator 0.8
Duncan Hall Viralator 0.9 Pre1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »