Search for packages
| purl | pkg:deb/debian/wget@1.18-5%2Bdeb9u3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4sdq-v9u1-97fy
Aliases: CVE-2017-13089 |
Affected by 1 other vulnerability. |
|
|
VCID-dt45-jeut-aygn
Aliases: CVE-2017-6508 |
Affected by 1 other vulnerability. |
|
|
VCID-huu2-56sz-cygz
Aliases: CVE-2017-13090 |
Affected by 1 other vulnerability. |
|
|
VCID-jgy2-zfn9-zufe
Aliases: CVE-2024-38428 |
url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent. |
Affected by 1 other vulnerability. |
|
VCID-rk2k-3ke9-h3ev
Aliases: CVE-2018-0494 |
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. |
Affected by 1 other vulnerability. |
|
VCID-tcup-t96u-s7gm
Aliases: CVE-2018-20483 |
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl. |
Affected by 1 other vulnerability. |
|
VCID-wa8k-k5qt-f3bv
Aliases: CVE-2019-5953 |
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. |
Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-229q-3atb-7qfa |
CVE-2016-4971
|
|
| VCID-49ve-fmbg-dfax |
CVE-2016-7098
|
|
| VCID-4sdq-v9u1-97fy |
CVE-2017-13089
|
|
| VCID-huu2-56sz-cygz |
CVE-2017-13090
|
|
| VCID-rk2k-3ke9-h3ev | GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. |
CVE-2018-0494
|
| VCID-wa8k-k5qt-f3bv | Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. |
CVE-2019-5953
|