{"url":"http://public2.vulnerablecode.io/api/packages/994159?format=json","purl":"pkg:deb/debian/wget@1.13.4-3%2Bdeb7u2","type":"deb","namespace":"debian","name":"wget","version":"1.13.4-3+deb7u2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.25.0-2","latest_non_vulnerable_version":"1.25.0-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34931?format=json","vulnerability_id":"VCID-8v5w-xx4w-fyc3","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=e996e322ffd42aaa051602da182d03178d0f13e1"},{"reference_url":"http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/info-gnu/2016-06/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-08/msg00043.html"},{"reference_url":"http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/162395/GNU-wget-Arbitrary-File-Upload-Code-Execution.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2587.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2587.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4971.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4971","reference_id":"","reference_type":"","scores":[{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.9886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98888","published_at":"2026-05-07T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98882","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98884","published_at":"2026-04-29T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98887","published_at":"2026-05-05T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98861","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98863","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98865","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98866","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98869","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.9887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98871","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98878","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74996","scoring_system":"epss","scoring_elements":"0.98883","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2016-4971","reference_id":"","reference_type":"","scores":[],"url":"https://security.paloaltonetworks.com/CVE-2016-4971"},{"reference_url":"https://www.exploit-db.com/exploits/40064/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/40064/"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"},{"reference_url":"http://www.securityfocus.com/bid/91530","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91530"},{"reference_url":"http://www.securitytracker.com/id/1036133","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036133"},{"reference_url":"http://www.ubuntu.com/usn/USN-3012-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3012-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343666","reference_id":"1343666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343666"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827003","reference_id":"827003","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827003"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"},{"reference_url":"http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40064.txt","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40064.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/49815.py","reference_id":"CVE-2016-4971","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/49815.py"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4971","reference_id":"CVE-2016-4971","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4971"},{"reference_url":"https://security.gentoo.org/glsa/201610-11","reference_id":"GLSA-201610-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2587","reference_id":"RHSA-2016:2587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2587"},{"reference_url":"https://usn.ubuntu.com/3012-1/","reference_id":"USN-3012-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3012-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"}],"aliases":["CVE-2016-4971"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8v5w-xx4w-fyc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34075?format=json","vulnerability_id":"VCID-b4sh-m4q3-8fd3","summary":"A vulnerability in GNU Wget might allow an attacker to execute\n    arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5953.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5953.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5953","reference_id":"","reference_type":"","scores":[{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81393","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81323","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81345","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81357","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82416","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82439","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.8236","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82375","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01727","scoring_system":"epss","scoring_elements":"0.82389","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-5953"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695679","reference_id":"1695679","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1695679"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926389","reference_id":"926389","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926389"},{"reference_url":"https://security.gentoo.org/glsa/201908-19","reference_id":"GLSA-201908-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:0983","reference_id":"RHSA-2019:0983","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:0983"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1228","reference_id":"RHSA-2019:1228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2979","reference_id":"RHSA-2019:2979","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2979"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3168","reference_id":"RHSA-2019:3168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3168"},{"reference_url":"https://usn.ubuntu.com/3943-1/","reference_id":"USN-3943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-1/"},{"reference_url":"https://usn.ubuntu.com/3943-2/","reference_id":"USN-3943-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2019-5953"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4sh-m4q3-8fd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61389?format=json","vulnerability_id":"VCID-cjxy-4u1b-kyht","summary":"A header injection vulnerability in GNU Wget might allow remote\n    attackers to inject arbitrary HTTP headers.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6508.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6508","reference_id":"","reference_type":"","scores":[{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34834","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.35","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.3498","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00148","scoring_system":"epss","scoring_elements":"0.34761","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40477","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40498","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40461","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40382","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40379","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40466","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40415","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6508"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429984","reference_id":"1429984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1429984"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857073","reference_id":"857073","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857073"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://security.gentoo.org/glsa/201706-16","reference_id":"GLSA-201706-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-16"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-6508"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cjxy-4u1b-kyht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59064?format=json","vulnerability_id":"VCID-qtqz-p2a8-ykcv","summary":"A vulnerablity in GNU Wget could allow arbitrary cookies to be\n    injected.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0494.json","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0494","reference_id":"","reference_type":"","scores":[{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.9845","published_at":"2026-05-07T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98439","published_at":"2026-04-13T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98444","published_at":"2026-04-16T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98442","published_at":"2026-04-21T12:55:00Z"},{"value":"0.64156","scoring_system":"epss","scoring_elements":"0.98446","published_at":"2026-04-29T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98693","published_at":"2026-04-07T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98695","published_at":"2026-04-09T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.98686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.70791","scoring_system":"epss","scoring_elements":"0.9869","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-0494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd","reference_id":"","reference_type":"","scores":[],"url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/05/msg00006.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html"},{"reference_url":"https://savannah.gnu.org/bugs/?53763","reference_id":"","reference_type":"","scores":[],"url":"https://savannah.gnu.org/bugs/?53763"},{"reference_url":"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt","reference_id":"","reference_type":"","scores":[],"url":"https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt"},{"reference_url":"https://www.debian.org/security/2018/dsa-4195","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4195"},{"reference_url":"https://www.exploit-db.com/exploits/44601/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44601/"},{"reference_url":"http://www.securityfocus.com/bid/104129","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104129"},{"reference_url":"http://www.securitytracker.com/id/1040838","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1040838"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575634","reference_id":"1575634","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1575634"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898076","reference_id":"898076","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=898076"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"http://seclists.org/fulldisclosure/2018/May/20","reference_id":"CVE-2018-0494","reference_type":"exploit","scores":[],"url":"http://seclists.org/fulldisclosure/2018/May/20"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44601.txt","reference_id":"CVE-2018-0494","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44601.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0494","reference_id":"CVE-2018-0494","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-0494"},{"reference_url":"https://security.gentoo.org/glsa/201806-01","reference_id":"GLSA-201806-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201806-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3052","reference_id":"RHSA-2018:3052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3052"},{"reference_url":"https://usn.ubuntu.com/3643-1/","reference_id":"USN-3643-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3643-1/"},{"reference_url":"https://usn.ubuntu.com/3643-2/","reference_id":"USN-3643-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3643-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2018-0494"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtqz-p2a8-ykcv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62370?format=json","vulnerability_id":"VCID-qwxx-kuek-j3fu","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=ba6b44f6745b14dce414761a8e4b35d31b176bba"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13090.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13090.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13090","reference_id":"","reference_type":"","scores":[{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92362","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92434","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92418","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92424","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92391","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08554","scoring_system":"epss","scoring_elements":"0.92404","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13090"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget"},{"reference_url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4008","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4008"},{"reference_url":"http://www.securityfocus.com/bid/101590","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101590"},{"reference_url":"http://www.securitytracker.com/id/1039661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505445","reference_id":"1505445","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505445"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957","reference_id":"879957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13090","reference_id":"CVE-2017-13090","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13090"},{"reference_url":"https://security.gentoo.org/glsa/201711-06","reference_id":"GLSA-201711-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3075","reference_id":"RHSA-2017:3075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3075"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-13090"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwxx-kuek-j3fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84941?format=json","vulnerability_id":"VCID-smv5-udwt-5qcq","summary":"wget: files rejected by access list are kept on the disk for the duration of HTTP connection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7098.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7098.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7098","reference_id":"","reference_type":"","scores":[{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91299","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91267","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06681","scoring_system":"epss","scoring_elements":"0.91282","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92494","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92534","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92533","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.9251","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08815","scoring_system":"epss","scoring_elements":"0.92522","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7098"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328137","reference_id":"1328137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1328137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836503","reference_id":"836503","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=836503"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/40824.py","reference_id":"CVE-2016-7098","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/40824.py"},{"reference_url":"https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html","reference_id":"CVE-2016-7098","reference_type":"exploit","scores":[],"url":"https://legalhackers.com/advisories/Wget-Exploit-ACL-bypass-RaceCond-CVE-2016-7098.html"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"}],"aliases":["CVE-2016-7098"],"risk_score":2.6,"exploitability":"2.0","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-smv5-udwt-5qcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62369?format=json","vulnerability_id":"VCID-um8z-unc6-bqhf","summary":"Multiple vulnerabilities have been found in Wget, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=d892291fb8ace4c3b734ea5125770989c215df3f"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13089.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-13089.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13089","reference_id":"","reference_type":"","scores":[{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98924","published_at":"2026-05-07T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98908","published_at":"2026-04-16T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.9891","published_at":"2026-04-18T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98913","published_at":"2026-04-21T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98918","published_at":"2026-04-26T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98919","published_at":"2026-04-29T12:55:00Z"},{"value":"0.75769","scoring_system":"epss","scoring_elements":"0.98923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.9894","published_at":"2026-04-11T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98941","published_at":"2026-04-12T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.76526","scoring_system":"epss","scoring_elements":"0.98935","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/r1b/CVE-2017-13089","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/r1b/CVE-2017-13089"},{"reference_url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget","reference_id":"","reference_type":"","scores":[],"url":"https://www.synology.com/support/security/Synology_SA_17_62_Wget"},{"reference_url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.viestintavirasto.fi/en/cybersecurity/vulnerabilities/2017/haavoittuvuus-2017-037.html"},{"reference_url":"http://www.debian.org/security/2017/dsa-4008","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-4008"},{"reference_url":"http://www.securityfocus.com/bid/101592","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101592"},{"reference_url":"http://www.securitytracker.com/id/1039661","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039661"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505444","reference_id":"1505444","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505444"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957","reference_id":"879957","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879957"},{"reference_url":"https://security.archlinux.org/ASA-201710-34","reference_id":"ASA-201710-34","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201710-34"},{"reference_url":"https://security.archlinux.org/AVG-473","reference_id":"AVG-473","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-473"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13089","reference_id":"CVE-2017-13089","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-13089"},{"reference_url":"https://security.gentoo.org/glsa/201711-06","reference_id":"GLSA-201711-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201711-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3075","reference_id":"RHSA-2017:3075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3075"},{"reference_url":"https://usn.ubuntu.com/3464-1/","reference_id":"USN-3464-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-1/"},{"reference_url":"https://usn.ubuntu.com/3464-2/","reference_id":"USN-3464-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3464-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036550?format=json","purl":"pkg:deb/debian/wget@1.16-1%2Bdeb8u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1%252Bdeb8u5"},{"url":"http://public2.vulnerablecode.io/api/packages/1037503?format=json","purl":"pkg:deb/debian/wget@1.18-5%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.18-5%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2017-13089"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-um8z-unc6-bqhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47382?format=json","vulnerability_id":"VCID-v7yu-hy66-gyh4","summary":"A vulnerability in GNU Wget which could allow an attacker to obtain\n    sensitive information.","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20483.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-20483.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20483","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12809","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12776","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12874","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12895","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12661","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1824","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18193","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.1819","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18399","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20483"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190321-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190321-0002/"},{"reference_url":"https://twitter.com/marcan42/status/1077676739877232640","reference_id":"","reference_type":"","scores":[],"url":"https://twitter.com/marcan42/status/1077676739877232640"},{"reference_url":"http://www.securityfocus.com/bid/106358","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106358"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662705","reference_id":"1662705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1662705"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917375","reference_id":"917375","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917375"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20483","reference_id":"CVE-2018-20483","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20483"},{"reference_url":"https://security.gentoo.org/glsa/201903-08","reference_id":"GLSA-201903-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201903-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3701","reference_id":"RHSA-2019:3701","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3701"},{"reference_url":"https://usn.ubuntu.com/3943-1/","reference_id":"USN-3943-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3943-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051185?format=json","purl":"pkg:deb/debian/wget@1.20.1-1.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.20.1-1.1"}],"aliases":["CVE-2018-20483"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7yu-hy66-gyh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/75403?format=json","vulnerability_id":"VCID-yyf4-yz4z-rugu","summary":"wget: Misinterpretation of input may lead to improper behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-38428.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38428","reference_id":"","reference_type":"","scores":[{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41358","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41509","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41506","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41287","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41709","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41636","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.4167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00197","scoring_system":"epss","scoring_elements":"0.41691","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-38428"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38428"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523","reference_id":"1073523","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1073523"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292836","reference_id":"2292836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2292836"},{"reference_url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace","reference_id":"?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/"}],"url":"https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace"},{"reference_url":"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:48:27Z/"}],"url":"https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4998","reference_id":"RHSA-2024:4998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:5299","reference_id":"RHSA-2024:5299","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:5299"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6192","reference_id":"RHSA-2024:6192","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6192"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6208","reference_id":"RHSA-2024:6208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:6438","reference_id":"RHSA-2024:6438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:6438"},{"reference_url":"https://usn.ubuntu.com/6852-1/","reference_id":"USN-6852-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6852-1/"},{"reference_url":"https://usn.ubuntu.com/6852-2/","reference_id":"USN-6852-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6852-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994693?format=json","purl":"pkg:deb/debian/wget@1.21.3-1%2Bdeb12u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-q53y-6aup-17gk"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.21.3-1%252Bdeb12u1"}],"aliases":["CVE-2024-38428"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yyf4-yz4z-rugu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57850?format=json","vulnerability_id":"VCID-zsab-gux6-eyh6","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0431.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0431.html"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877","reference_id":"","reference_type":"","scores":[{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98857","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877"},{"reference_url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access","reference_id":"","reference_type":"","scores":[],"url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201411-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201411-05.xml"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rapid7/metasploit-framework/pull/4088","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/rapid7/metasploit-framework/pull/4088"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106"},{"reference_url":"http://www.debian.org/security/2014/dsa-3062","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3062"},{"reference_url":"http://www.kb.cert.org/vuls/id/685996","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/685996"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/70751","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70751"},{"reference_url":"http://www.ubuntu.com/usn/USN-2393-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2393-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181","reference_id":"1139181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981","reference_id":"766981","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877","reference_id":"CVE-2014-4877","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877"},{"reference_url":"https://security.gentoo.org/glsa/201411-05","reference_id":"GLSA-201411-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1764","reference_id":"RHSA-2014:1764","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1955","reference_id":"RHSA-2014:1955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1955"},{"reference_url":"https://usn.ubuntu.com/2393-1/","reference_id":"USN-2393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1036549?format=json","purl":"pkg:deb/debian/wget@1.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1"}],"aliases":["CVE-2014-4877"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsab-gux6-eyh6"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88782?format=json","vulnerability_id":"VCID-5u23-3wxr-27du","summary":"Wget attempts to dereference NULL pointer upon response from malicious FTP server","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6719","reference_id":"","reference_type":"","scores":[{"value":"0.04476","scoring_system":"epss","scoring_elements":"0.89163","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04476","scoring_system":"epss","scoring_elements":"0.89147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89513","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89516","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89531","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89529","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89521","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04835","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-6719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6719"},{"reference_url":"https://issues.rpath.com/browse/RPL-930","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-930"},{"reference_url":"https://www.exploit-db.com/exploits/2947","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/2947"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"},{"reference_url":"http://www.securityfocus.com/bid/21650","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/21650"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=221459","reference_id":"221459","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=221459"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6719","reference_id":"CVE-2006-6719","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-6719"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2947.pl","reference_id":"OSVDB-32755;CVE-2006-6719","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/2947.pl"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994159?format=json","purl":"pkg:deb/debian/wget@1.13.4-3%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.13.4-3%252Bdeb7u2"}],"aliases":["CVE-2006-6719"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5u23-3wxr-27du"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57850?format=json","vulnerability_id":"VCID-zsab-gux6-eyh6","summary":"security update","references":[{"reference_url":"http://advisories.mageia.org/MGASA-2014-0431.html","reference_id":"","reference_type":"","scores":[],"url":"http://advisories.mageia.org/MGASA-2014-0431.html"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=18b0979357ed7dc4e11d4f2b1d7e0f5932d82aa7"},{"reference_url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/wget.git/commit/?id=b4440d96cf8173d68ecaa07c36b8f4316ee794d0"},{"reference_url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-wget/2014-10/msg00150.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00009.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-11/msg00026.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1764.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1955.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877","reference_id":"","reference_type":"","scores":[{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98832","published_at":"2026-04-01T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98837","published_at":"2026-04-07T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98841","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98856","published_at":"2026-04-24T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98855","published_at":"2026-04-26T12:55:00Z"},{"value":"0.74311","scoring_system":"epss","scoring_elements":"0.98857","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4877"},{"reference_url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access","reference_id":"","reference_type":"","scores":[],"url":"https://community.rapid7.com/community/metasploit/blog/2014/10/28/r7-2014-15-gnu-wget-ftp-symlink-arbitrary-filesystem-access"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201411-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201411-05.xml"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/rapid7/metasploit-framework/pull/4088","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/rapid7/metasploit-framework/pull/4088"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10106"},{"reference_url":"http://www.debian.org/security/2014/dsa-3062","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3062"},{"reference_url":"http://www.kb.cert.org/vuls/id/685996","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/685996"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2015:121"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html"},{"reference_url":"http://www.securityfocus.com/bid/70751","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/70751"},{"reference_url":"http://www.ubuntu.com/usn/USN-2393-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2393-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181","reference_id":"1139181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1139181"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981","reference_id":"766981","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=766981"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.13.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:wget:1.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877","reference_id":"CVE-2014-4877","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4877"},{"reference_url":"https://security.gentoo.org/glsa/201411-05","reference_id":"GLSA-201411-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201411-05"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1764","reference_id":"RHSA-2014:1764","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1764"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1955","reference_id":"RHSA-2014:1955","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1955"},{"reference_url":"https://usn.ubuntu.com/2393-1/","reference_id":"USN-2393-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2393-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994159?format=json","purl":"pkg:deb/debian/wget@1.13.4-3%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"},{"vulnerability":"VCID-zsab-gux6-eyh6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.13.4-3%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/1036549?format=json","purl":"pkg:deb/debian/wget@1.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8v5w-xx4w-fyc3"},{"vulnerability":"VCID-b4sh-m4q3-8fd3"},{"vulnerability":"VCID-cjxy-4u1b-kyht"},{"vulnerability":"VCID-qtqz-p2a8-ykcv"},{"vulnerability":"VCID-qwxx-kuek-j3fu"},{"vulnerability":"VCID-smv5-udwt-5qcq"},{"vulnerability":"VCID-um8z-unc6-bqhf"},{"vulnerability":"VCID-v7yu-hy66-gyh4"},{"vulnerability":"VCID-yyf4-yz4z-rugu"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.16-1"}],"aliases":["CVE-2014-4877"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsab-gux6-eyh6"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wget@1.13.4-3%252Bdeb7u2"}