Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wget vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2252
GNU Wget 1.12 and previous versions uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by ...
Gnu Wget 1.8.2
Gnu Wget 1.8.1
Gnu Wget 1.11.3
Gnu Wget 1.11.2
Gnu Wget 1.8
Gnu Wget 1.7.1
Gnu Wget 1.11.1
Gnu Wget 1.11
Gnu Wget 1.9
Gnu Wget 1.5.3
Gnu Wget 1.11.4
Gnu Wget 1.9.1
Gnu Wget
Gnu Wget 1.7
Gnu Wget 1.6
Gnu Wget 1.10.2
Gnu Wget 1.10.1
Gnu Wget 1.10
NA
CVE-2009-3490
GNU Wget prior to 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote malicious users to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Cert...
Gnu Wget 1.10.1
Gnu Wget 1.10.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.11.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.11.2
Gnu Wget 1.11.3
Gnu Wget 1.10
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.7
Gnu Wget 1.7.1
Gnu Wget 1.11
Gnu Wget
NA
CVE-2006-6719
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote malicious users to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
Gnu Wget 1.7
Gnu Wget 1.7.1
Gnu Wget 1.10.1
Gnu Wget 1.10.2
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.9.1
Gnu Wget 1.10
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
NA
CVE-2004-2014
Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded.
Gnu Wget 1.6
Gnu Wget 1.7
Gnu Wget 1.5.3
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.7.1
Gnu Wget 1.8
1 EDB exploit
NA
CVE-2004-1487
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
NA
CVE-2004-1488
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Gnu Wget 1.8.2
Gnu Wget 1.9
Gnu Wget 1.9.1
Gnu Wget 1.8
Gnu Wget 1.8.1
1 EDB exploit
NA
CVE-2002-1344
Directory traversal vulnerability in wget prior to 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Gnu Wget 1.8
Gnu Wget 1.8.1
Gnu Wget 1.5.3
Gnu Wget 1.6
Gnu Wget 1.8.2
Sun Cobalt Raq Xtr
Gnu Wget 1.7
Gnu Wget 1.7.1
NA
CVE-2005-3185
Stack-based buffer overflow in the ntlm_output function in http-ntlm.c for (1) wget 1.10, (2) curl 7.13.2, and (3) libcurl 7.13.2, and other products that use libcurl, when NTLM authentication is enabled, allows remote servers to execute arbitrary code via a long NTLM username.
Libcurl Libcurl 7.13.2
Wget Wget 1.10
Curl Curl 7.13.2
6.1
CVSSv3
CVE-2017-6508
CRLF injection vulnerability in the url_parse function in url.c in Wget up to and including 1.19.1 allows remote malicious users to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.
Gnu Wget
8.1
CVSSv3
CVE-2016-7098
Race condition in wget 1.17 and previous versions, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
Gnu Wget
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »