Page 2 of 16 results (0.002 seconds)

CVSS: 9.8EPSS: 49%CPEs: 8EXPL: 3

29 Oct 2014 — Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink. Vulnerabilidad de salto de ruta absoluta en GNU Wget anterior a 1.16, cuando la recursión esta habilitada, permite a servidores FTP remotos escribir a ficheros arbitrarios, y como consecuencia ... • https://packetstorm.news/files/id/180741 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 8.1EPSS: 3%CPEs: 18EXPL: 0

06 Jul 2010 — GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory. GNU Wget v1.12 y anteriores usan un nombre de fichero proporcionado por el servidor en lugar de... • http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 1%CPEs: 16EXPL: 0

30 Sep 2009 — GNU Wget before 1.12 does not properly handle a '\0' character in a domain name in the Common Name field of an X.509 certificate, which allows man-in-the-middle remote attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. GNU Wget, en versiones anteriores a la 1.12 no maneja adecuadamente un caracter '\0' en un nombre de dominio, en el campo Common Name de una certificado X.509, lo cual permite a atacantes hombre-... • http://addictivecode.org/pipermail/wget-notify/2009-August/001808.html • CWE-310: Cryptographic Issues •

CVSS: 7.5EPSS: 3%CPEs: 12EXPL: 2

23 Dec 2006 — The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command. La función ftp_syst en ftp-basic.c en Free Software Foundation (FSF) GNU wget 1.10.2 permite a un atacante remoto provocar denegación de servicio (caida de aplicación) a través de un servidor FTP malicioso con un gran número de respuestas 220 en blanco al coman... • https://www.exploit-db.com/exploits/2947 •

CVSS: 9.1EPSS: 0%CPEs: 9EXPL: 2

31 Dec 2004 — Wget 1.9 and 1.9.1 allows local users to overwrite arbitrary files via a symlink attack on the name of the file being downloaded. • https://www.exploit-db.com/exploits/24123 •

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

11 Dec 2002 — Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences. Vulnerabilidad de atravesamiento de directorios en wget anteriores a 1.8.2-4 permite a servidores FTP remotos la creación o sobreescritura de ficheros como usuario wget mediante nombres de ficheros que contengan: direccionamiento absoluto secuencias .. (punto punto) • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-003.0.txt •