{"url":"http://public2.vulnerablecode.io/api/packages/994150?format=json","purl":"pkg:deb/debian/wget@1.5.3-1.1","type":"deb","namespace":"debian","name":"wget","version":"1.5.3-1.1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.25.0-2","latest_non_vulnerable_version":"1.25.0-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56919?format=json","vulnerability_id":"VCID-4drq-2td7-akbk","summary":"cURL is vulnerable to a buffer overflow which could lead to the execution\n    of arbitrary code.","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.10/SCOSA-2006.10.txt"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=302847","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=302847"},{"reference_url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185","reference_id":"","reference_type":"","scores":[{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89571","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89504","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89552","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.8952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89536","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89547","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89553","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04852","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3185"},{"reference_url":"https://curl.se/docs/CVE-2005-3185.html","reference_id":"","reference_type":"","scores":[{"value":"High","scoring_system":"cvssv3.1","scoring_elements":""}],"url":"https://curl.se/docs/CVE-2005-3185.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3185"},{"reference_url":"http://secunia.com/advisories/17192","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17192"},{"reference_url":"http://secunia.com/advisories/17193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17193"},{"reference_url":"http://secunia.com/advisories/17203","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17203"},{"reference_url":"http://secunia.com/advisories/17208","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17208"},{"reference_url":"http://secunia.com/advisories/17228","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17228"},{"reference_url":"http://secunia.com/advisories/17247","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17247"},{"reference_url":"http://secunia.com/advisories/17297","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17297"},{"reference_url":"http://secunia.com/advisories/17320","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17320"},{"reference_url":"http://secunia.com/advisories/17400","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17400"},{"reference_url":"http://secunia.com/advisories/17403","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17403"},{"reference_url":"http://secunia.com/advisories/17485","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17485"},{"reference_url":"http://secunia.com/advisories/17813","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17813"},{"reference_url":"http://secunia.com/advisories/17965","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17965"},{"reference_url":"http://secunia.com/advisories/19193","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19193"},{"reference_url":"http://securityreason.com/securityalert/82","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/82"},{"reference_url":"http://securitytracker.com/id?1015056","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015056"},{"reference_url":"http://securitytracker.com/id?1015057","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1015057"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22721"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.519010"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9810"},{"reference_url":"http://www.debian.org/security/2005/dsa-919","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-919"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200510-19.xml"},{"reference_url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities","reference_id":"","reference_type":"","scores":[],"url":"http://www.idefense.com/application/poi/display?id=322&type=vulnerabilities"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:182"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_63_wget_curl.html"},{"reference_url":"http://www.osvdb.org/20011","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/20011"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00020.html"},{"reference_url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00055.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-807.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-807.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-812.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-812.html"},{"reference_url":"http://www.securityfocus.com/bid/15102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15102"},{"reference_url":"http://www.securityfocus.com/bid/15647","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/15647"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2088","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2088"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2125","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2125"},{"reference_url":"http://www.vupen.com/english/advisories/2005/2659","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2005/2659"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794","reference_id":"1617794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617794"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734","reference_id":"333734","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=333734"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:curl:curl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libcurl:libcurl:7.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wget:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185","reference_id":"CVE-2005-3185","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3185"},{"reference_url":"https://security.gentoo.org/glsa/200510-19","reference_id":"GLSA-200510-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200510-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:807","reference_id":"RHSA-2005:807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:812","reference_id":"RHSA-2005:812","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:812"},{"reference_url":"https://usn.ubuntu.com/205-1/","reference_id":"USN-205-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/205-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994154?format=json","purl":"pkg:deb/debian/wget@1.10.2-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.10.2-2"}],"aliases":["CVE-2005-3185"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4drq-2td7-akbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88782?format=json","vulnerability_id":"VCID-5u23-3wxr-27du","summary":"Wget attempts to dereference NULL pointer upon response from malicious FTP server","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6719","reference_id":"","reference_type":"","scores":[{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89531","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719"},{"reference_url":"https://issues.rpath.com/browse/RPL-930","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-930"},{"reference_url":"https://www.exploit-db.com/exploits/2947","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/2947"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"},{"reference_url":"http://www.securityfocus.com/bid/21650","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21650"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=221459","reference_id":"221459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=221459"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6719","reference_id":"CVE-2006-6719","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6719"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2947.pl","reference_id":"OSVDB-32755;CVE-2006-6719","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2947.pl"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994159?format=json","purl":"pkg:deb/debian/wget@1.13.4-3%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.13.4-3%252Bdeb7u2"}],"aliases":["CVE-2006-6719"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5u23-3wxr-27du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34931?format=json","vulnerability_id":"VCID-8v5w-xx4w-fyc3","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1"},{"reference_url":"http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html"},{"reference_url":"http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2587.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2587.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4971.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4971","reference_id":"","reference_type":"","scores":[{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.9886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98883","published_at":"2026-04-24T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.9887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98874","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2016-4971","reference_id":"","reference_type":"","scores":[],"url":"https://security.paloaltonetworks.com/CVE-2016-4971"},{"reference_url":"https://www.exploit-db.com/exploits/40064/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/40064/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/91530","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91530"},{"reference_url":"http://www.securitytracker.com/id/1036133","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036133"},{"reference_url":"http://www.ubuntu.com/usn/USN-3012-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3012-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343666","reference_id":"1343666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343666"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827003","reference_id":"827003","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827003"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"},{"reference_url":"http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40064.txt","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40064.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/49815.py","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/49815.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4971","reference_id":"CVE-2016-4971","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4971"},{"reference_url":"https://security.gentoo.org/glsa/201610-11","reference_id":"GLSA-201610-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2587","reference_id":"RHSA-2016:2587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2587"},{"reference_url":"https://usn.ubuntu.com/3012-1/","reference_id":"USN-3012-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3012-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"}],"aliases":["CVE-2016-4971"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8v5w-xx4w-fyc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34075?format=json","vulnerability_id":"VCID-b4sh-m4q3-8fd3","summary":"A vulnerability in GNU Wget might allow an attacker to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5953.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5953","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.8236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82375","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695679","reference_id":"1695679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695679"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926389","reference_id":"926389","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926389"},{"reference_url":"https://security.gentoo.org/glsa/201908-19","reference_id":"GLSA-201908-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0983","reference_id":"RHSA-2019:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1228","reference_id":"RHSA-2019:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2979","reference_id":"RHSA-2019:2979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3168","reference_id":"RHSA-2019:3168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3168"},{"reference_url":"https://usn.ubuntu.com/3943-1/","reference_id":"USN-3943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-1/"},{"reference_url":"https://usn.ubuntu.com/3943-2/","reference_id":"USN-3943-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2019-5953"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4sh-m4q3-8fd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61389?format=json","vulnerability_id":"VCID-cjxy-4u1b-kyht","summary":"A header injection vulnerability in GNU Wget might allow remote\n    attackers to inject arbitrary HTTP headers.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6508.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6508","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40415","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40379","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429984","reference_id":"1429984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857073","reference_id":"857073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857073"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://security.gentoo.org/glsa/201706-16","reference_id":"GLSA-201706-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-16"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-6508"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjxy-4u1b-kyht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61758?format=json","vulnerability_id":"VCID-fbj7-rc7e-mkgh","summary":"Insecure usage of server provided filenames may allow the creation\n    or overwriting of local files.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00023.html"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00031.html"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00032.html"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00033.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00033.html"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00034.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2010-05/msg00034.html"},{"reference_url":"http://marc.info/?l=oss-security&m=127411372529485&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127411372529485&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127412569216380&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127412569216380&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127416905831994&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127416905831994&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127422615924593&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127422615924593&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127427572721591&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127427572721591&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127432968701342&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127432968701342&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127441275821210&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127441275821210&w=2"},{"reference_url":"http://marc.info/?l=oss-security&m=127611288927500&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=oss-security&m=127611288927500&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-0151.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-0151.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2252.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2252.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2252","reference_id":"","reference_type":"","scores":[{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89655","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89631","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89639","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.8964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89635","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.8965","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04935","scoring_system":"epss","scoring_elements":"0.89654","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90861","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90866","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90876","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90899","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0625","scoring_system":"epss","scoring_elements":"0.90905","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-2252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252"},{"reference_url":"http://www.ocert.org/advisories/ocert-2010-001.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.ocert.org/advisories/ocert-2010-001.html"},{"reference_url":"http://www.securityfocus.com/bid/65722","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/65722"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590296","reference_id":"590296","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=590296"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=602797","reference_id":"602797","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=602797"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.11.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.11.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2252","reference_id":"CVE-2010-2252","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-2252"},{"reference_url":"https://security.gentoo.org/glsa/201110-10","reference_id":"GLSA-201110-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201110-10"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0151","reference_id":"RHSA-2014:0151","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0151"},{"reference_url":"https://usn.ubuntu.com/982-1/","reference_id":"USN-982-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/982-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994157?format=json","purl":"pkg:deb/debian/wget@1.12-2.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.12-2.1"}],"aliases":["CVE-2010-2252"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fbj7-rc7e-mkgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89794?format=json","vulnerability_id":"VCID-fuw5-1kwb-tyck","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1344.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1344.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1344","reference_id":"","reference_type":"","scores":[{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.7558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75583","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75613","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75639","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75664","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75677","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75681","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75666","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75705","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.7571","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00898","scoring_system":"epss","scoring_elements":"0.75721","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1344"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1344","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1344"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616879","reference_id":"1616879","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616879"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:229","reference_id":"RHSA-2002:229","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:256","reference_id":"RHSA-2002:256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:256"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994153?format=json","purl":"pkg:deb/debian/wget@1.9.1-12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.9.1-12"}],"aliases":["CVE-2002-1344"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fuw5-1kwb-tyck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60258?format=json","vulnerability_id":"VCID-h2ee-geak-xqfv","summary":"An error in the X.509 certificate handling of Wget might enable remote\n    attackers to conduct man-in-the-middle attacks.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3490.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3490.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3490","reference_id":"","reference_type":"","scores":[{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82988","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82862","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82871","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82904","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.8292","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82915","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82951","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.8295","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82973","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01831","scoring_system":"epss","scoring_elements":"0.82984","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3490"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3490"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=520454","reference_id":"520454","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=520454"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549293","reference_id":"549293","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549293"},{"reference_url":"https://security.gentoo.org/glsa/200910-01","reference_id":"GLSA-200910-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200910-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1549","reference_id":"RHSA-2009:1549","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1549"},{"reference_url":"https://usn.ubuntu.com/842-1/","reference_id":"USN-842-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/842-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994157?format=json","purl":"pkg:deb/debian/wget@1.12-2.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.12-2.1"}],"aliases":["CVE-2009-3490"],"risk_score":1.7,"exploitability":"0.5","weighted_severity":"3.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h2ee-geak-xqfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89354?format=json","vulnerability_id":"VCID-p2rg-34nt-dbc1","summary":"security flaw","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755"},{"reference_url":"http://marc.info/?l=bugtraq&m=110269474112384&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110269474112384&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1488.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1488","reference_id":"","reference_type":"","scores":[{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94192","published_at":"2026-04-29T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94126","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94136","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94148","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94151","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.9416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94164","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94185","published_at":"2026-04-16T12:55:00Z"},{"value":"0.13302","scoring_system":"epss","scoring_elements":"0.94189","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1488"},{"reference_url":"http://secunia.com/advisories/20960","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/20960"},{"reference_url":"http://securitytracker.com/id?1012472","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1012472"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18421","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18421"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9750"},{"reference_url":"http://www.novell.com/linux/security/advisories/2006_16_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2006_16_sr.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-771.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-771.html"},{"reference_url":"http://www.securityfocus.com/bid/11871","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617414","reference_id":"1617414","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617414"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1488","reference_id":"CVE-2004-1488","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1488"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24813.pl","reference_id":"CVE-2004-1488;OSVDB-12638","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/24813.pl"},{"reference_url":"https://www.securityfocus.com/bid/11871/info","reference_id":"CVE-2004-1488;OSVDB-12638","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/11871/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:771","reference_id":"RHSA-2005:771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:771"},{"reference_url":"https://usn.ubuntu.com/145-1/","reference_id":"USN-145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994153?format=json","purl":"pkg:deb/debian/wget@1.9.1-12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.9.1-12"}],"aliases":["CVE-2004-1488"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2rg-34nt-dbc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89353?format=json","vulnerability_id":"VCID-pbm5-fnnd-d3bw","summary":"security flaw","references":[{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755"},{"reference_url":"http://marc.info/?l=bugtraq&m=110269474112384&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=110269474112384&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1487.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1487.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1487","reference_id":"","reference_type":"","scores":[{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71854","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71729","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71736","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71768","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.7178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71804","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71787","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71769","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71818","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.718","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0069","scoring_system":"epss","scoring_elements":"0.71851","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1487"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1487","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1487"},{"reference_url":"http://securitytracker.com/id?1012472","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1012472"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18420","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18420"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-771.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-771.html"},{"reference_url":"http://www.securityfocus.com/bid/11871","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617413","reference_id":"1617413","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617413"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1487","reference_id":"CVE-2004-1487","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-1487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:771","reference_id":"RHSA-2005:771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:771"},{"reference_url":"https://usn.ubuntu.com/145-1/","reference_id":"USN-145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994153?format=json","purl":"pkg:deb/debian/wget@1.9.1-12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.9.1-12"}],"aliases":["CVE-2004-1487"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbm5-fnnd-d3bw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89494?format=json","vulnerability_id":"VCID-pvwa-watz-dfh9","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2014.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-2014.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2014","reference_id":"","reference_type":"","scores":[{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37973","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38177","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38063","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38109","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38088","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.38025","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.3781","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37787","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00169","scoring_system":"epss","scoring_elements":"0.37693","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-2014"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2014","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2014"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617420","reference_id":"1617420","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617420"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24123.sh","reference_id":"CVE-2004-2014;OSVDB-16902","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/24123.sh"},{"reference_url":"https://www.securityfocus.com/bid/10361/info","reference_id":"CVE-2004-2014;OSVDB-16902","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/10361/info"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:771","reference_id":"RHSA-2005:771","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:771"},{"reference_url":"https://usn.ubuntu.com/145-1/","reference_id":"USN-145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994153?format=json","purl":"pkg:deb/debian/wget@1.9.1-12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.9.1-12"}],"aliases":["CVE-2004-2014"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pvwa-watz-dfh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59064?format=json","vulnerability_id":"VCID-qtqz-p2a8-ykcv","summary":"A vulnerablity in GNU Wget could allow arbitrary cookies to be\n    injected.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0494.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0494","reference_id":"","reference_type":"","scores":[{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.9869","published_at":"2026-04-04T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98686","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd","reference_id":"","reference_type":"","scores":[],"url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html"},{"reference_url":"https://savannah.gnu.org/bugs/?53763","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.gnu.org/bugs/?53763"},{"reference_url":"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt","reference_id":"","reference_type":"","scores":[],"url":"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt"},{"reference_url":"https://www.debian.org/security/2018/dsa-4195","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4195"},{"reference_url":"https://www.exploit-db.com/exploits/44601/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44601/"},{"reference_url":"http://www.securityfocus.com/bid/104129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104129"},{"reference_url":"http://www.securitytracker.com/id/1040838","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575634","reference_id":"1575634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575634"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898076","reference_id":"898076","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898076"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"http://seclists.org/fulldisclosure/2018/May/20","reference_id":"CVE-2018-0494","reference_type":"exploit","scores":[],"url":"http://seclists.org/fulldisclosure/2018/May/20"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44601.txt","reference_id":"CVE-2018-0494","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44601.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0494","reference_id":"CVE-2018-0494","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0494"},{"reference_url":"https://security.gentoo.org/glsa/201806-01","reference_id":"GLSA-201806-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201806-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3052","reference_id":"RHSA-2018:3052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3052"},{"reference_url":"https://usn.ubuntu.com/3643-1/","reference_id":"USN-3643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3643-1/"},{"reference_url":"https://usn.ubuntu.com/3643-2/","reference_id":"USN-3643-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3643-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2018-0494"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtqz-p2a8-ykcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62370?format=json","vulnerability_id":"VCID-qwxx-kuek-j3fu","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13090.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13090","reference_id":"","reference_type":"","scores":[{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92404","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92396","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget"},{"reference_url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4008","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4008"},{"reference_url":"http://www.securityfocus.com/bid/101590","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101590"},{"reference_url":"http://www.securitytracker.com/id/1039661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505445","reference_id":"1505445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957","reference_id":"879957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13090","reference_id":"CVE-2017-13090","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13090"},{"reference_url":"https://security.gentoo.org/glsa/201711-06","reference_id":"GLSA-201711-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3075","reference_id":"RHSA-2017:3075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3075"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-13090"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwxx-kuek-j3fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84941?format=json","vulnerability_id":"VCID-smv5-udwt-5qcq","summary":"wget: files rejected by access list are kept on the disk for the duration of HTTP connection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7098.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7098","reference_id":"","reference_type":"","scores":[{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.9251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92522","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328137","reference_id":"1328137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836503","reference_id":"836503","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836503"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/40824.py","reference_id":"CVE-2016-7098","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/40824.py"},{"reference_url":"https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html","reference_id":"CVE-2016-7098","reference_type":"exploit","scores":[],"url":"https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"}],"aliases":["CVE-2016-7098"],"risk_score":2.6,"exploitability":"2.0","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smv5-udwt-5qcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89793?format=json","vulnerability_id":"VCID-txw8-ve2p-vubh","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1565.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1565.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1565","reference_id":"","reference_type":"","scores":[{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76131","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76168","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76181","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76194","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76219","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76195","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76238","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.7622","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76258","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.76268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00937","scoring_system":"epss","scoring_elements":"0.7628","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1565"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1565","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1565"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616923","reference_id":"1616923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616923"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:372","reference_id":"RHSA-2003:372","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:372"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994153?format=json","purl":"pkg:deb/debian/wget@1.9.1-12","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-4drq-2td7-akbk"},{"vulnerability":"VCID-5u23-3wxr-27du"},{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-fbj7-rc7e-mkgh"},{"vulnerability":"VCID-h2ee-geak-xqfv"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.9.1-12"}],"aliases":["CVE-2002-1565"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txw8-ve2p-vubh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62369?format=json","vulnerability_id":"VCID-um8z-unc6-bqhf","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13089.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13089.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13089","reference_id":"","reference_type":"","scores":[{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.9891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98935","published_at":"2026-04-04T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.9894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98942","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/r1b/CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/r1b/CVE-2017-13089"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget"},{"reference_url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4008","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4008"},{"reference_url":"http://www.securityfocus.com/bid/101592","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101592"},{"reference_url":"http://www.securitytracker.com/id/1039661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505444","reference_id":"1505444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505444"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957","reference_id":"879957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13089","reference_id":"CVE-2017-13089","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13089"},{"reference_url":"https://security.gentoo.org/glsa/201711-06","reference_id":"GLSA-201711-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3075","reference_id":"RHSA-2017:3075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3075"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-13089"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um8z-unc6-bqhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47382?format=json","vulnerability_id":"VCID-v7yu-hy66-gyh4","summary":"A vulnerability in GNU Wget which could allow an attacker to obtain\n    sensitive information.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20483.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20483","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18399","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.181","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190321-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190321-0002/"},{"reference_url":"https://twitter.com/marcan42/status/1077676739877232640","reference_id":"","reference_type":"","scores":[],"url":"https://twitter.com/marcan42/status/1077676739877232640"},{"reference_url":"http://www.securityfocus.com/bid/106358","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106358"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662705","reference_id":"1662705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662705"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917375","reference_id":"917375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917375"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20483","reference_id":"CVE-2018-20483","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20483"},{"reference_url":"https://security.gentoo.org/glsa/201903-08","reference_id":"GLSA-201903-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3701","reference_id":"RHSA-2019:3701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3701"},{"reference_url":"https://usn.ubuntu.com/3943-1/","reference_id":"USN-3943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2018-20483"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7yu-hy66-gyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75403?format=json","vulnerability_id":"VCID-yyf4-yz4z-rugu","summary":"wget: Misinterpretation of input may lead to improper behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38428","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41691","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41685","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523","reference_id":"1073523","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292836","reference_id":"2292836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292836"},{"reference_url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace","reference_id":"?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/"}],"url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace"},{"reference_url":"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/"}],"url":"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4998","reference_id":"RHSA-2024:4998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5299","reference_id":"RHSA-2024:5299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6192","reference_id":"RHSA-2024:6192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6208","reference_id":"RHSA-2024:6208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6438","reference_id":"RHSA-2024:6438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6438"},{"reference_url":"https://usn.ubuntu.com/6852-1/","reference_id":"USN-6852-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6852-1/"},{"reference_url":"https://usn.ubuntu.com/6852-2/","reference_id":"USN-6852-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6852-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994693?format=json","purl":"pkg:deb/debian/wget@1.21.3-1%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-q53y-6aup-17gk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.21.3-1%252Bdeb12u1"}],"aliases":["CVE-2024-38428"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyf4-yz4z-rugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57850?format=json","vulnerability_id":"VCID-zsab-gux6-eyh6","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0431.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0431.html"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877","reference_id":"","reference_type":"","scores":[{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98857","published_at":"2026-04-29T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98856","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877"},{"reference_url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access","reference_id":"","reference_type":"","scores":[],"url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201411-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201411-05.xml"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rapid7/metasploit-framework/pull/4088","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/rapid7/metasploit-framework/pull/4088"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106"},{"reference_url":"http://www.debian.org/security/2014/dsa-3062","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3062"},{"reference_url":"http://www.kb.cert.org/vuls/id/685996","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/685996"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/70751","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70751"},{"reference_url":"http://www.ubuntu.com/usn/USN-2393-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2393-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181","reference_id":"1139181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981","reference_id":"766981","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877","reference_id":"CVE-2014-4877","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877"},{"reference_url":"https://security.gentoo.org/glsa/201411-05","reference_id":"GLSA-201411-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1764","reference_id":"RHSA-2014:1764","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1955","reference_id":"RHSA-2014:1955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1955"},{"reference_url":"https://usn.ubuntu.com/2393-1/","reference_id":"USN-2393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994159?format=json","purl":"pkg:deb/debian/wget@1.13.4-3%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.13.4-3%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036549?format=json","purl":"pkg:deb/debian/wget@1.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1"}],"aliases":["CVE-2014-4877"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsab-gux6-eyh6"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.5.3-1.1"}