Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wget vulnerabilities and exploits
(subscribe to this query)
454
VMScore
CVE-2006-2550
perlpodder prior to 0.5 allows remote malicious users to execute arbitrary code via shell metacharacters in the URL of a podcast, which are executed when saving the URL to a log file. NOTE: the wget vector is already covered by CVE-2006-2548.
Perlpodder Perlpodder 0.3
Perlpodder Perlpodder
Perlpodder Perlpodder 0.2
668
VMScore
CVE-2005-3185
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Libcurl Libcurl 7.13.2
Wget Wget 1.10
Curl Curl 7.13.2
187
VMScore
CVE-2005-1879
LutelWall 0.97 and previous versions allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
Lutel Lutelwall
187
VMScore
CVE-2005-1880
everybuddy 0.4.3 and previous versions allows local users to overwrite arbitrary files via a symlink attack on a temporary file created by a system call to wget.
Everybuddy Everybuddy
505
VMScore
CVE-2004-1488
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
445
VMScore
CVE-2004-1487
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
265
VMScore
CVE-2004-2014
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.
Gnu Wget 1.6
Gnu Wget 1.7
Gnu Wget 1.5.3
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.7.1
Gnu Wget 1.8
1 EDB exploit
668
VMScore
CVE-2002-1565
Buffer overflow in url_filename function for wget 1.8.1 allows malicious users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Immunix Immunix 7
445
VMScore
CVE-2002-1344
Directory traversal vulnerability in wget prior to 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.8.2
Sun Cobalt Raq Xtr
Gnu Wget 1.7
Gnu Wget 1.7.1
668
VMScore
CVE-2001-0849
viralator CGI script in Viralator 0.9pre1 and previous versions allows remote malicious users to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget.
Duncan Hall Viralator 0.7
Duncan Hall Viralator 0.8
Duncan Hall Viralator 0.9 Pre1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »