Total vulnerabilities in the database
GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
Software | From | Fixed in |
---|---|---|
gnu / wget | 1.11.3 | 1.11.3.x |
gnu / wget | 1.11.2 | 1.11.2.x |
gnu / wget | 1.8.2 | 1.8.2.x |
gnu / wget | 1.7 | 1.7.x |
gnu / wget | 1.11.4 | 1.11.4.x |
gnu / wget | 1.9 | 1.9.x |
gnu / wget | 1.10 | 1.10.x |
gnu / wget | 1.6 | 1.6.x |
gnu / wget | 1.8 | 1.8.x |
gnu / wget | 1.11.1 | 1.11.1.x |
gnu / wget | 1.8.1 | 1.8.1.x |
gnu / wget | 1.10.1 | 1.10.1.x |
gnu / wget | 1.9.1 | 1.9.1.x |
gnu / wget | 1.11 | 1.11.x |
gnu / wget | - | 1.12.x |
gnu / wget | 1.7.1 | 1.7.1.x |
gnu / wget | 1.5.3 | 1.5.3.x |
gnu / wget | 1.10.2 | 1.10.2.x |