|Max CVSS||9.3||Min CVSS||4.3||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
|05-05-2021 - 14:43||30-06-2016 - 17:59|
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
|24-08-2020 - 17:37||17-05-2019 - 16:29|
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
|15-03-2019 - 01:22||06-05-2018 - 22:29|
The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk's length, but doesn't check that the chunk length is a non-negative
|30-12-2017 - 02:29||27-10-2017 - 19:29|
Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two
|17-02-2017 - 02:59||29-10-2014 - 10:55|
GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc f
|28-11-2016 - 19:07||06-07-2010 - 17:17|