Search for packages
| purl | pkg:deb/debian/wget@1.10.2-2%2Betch1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-229q-3atb-7qfa
Aliases: CVE-2016-4971 |
Affected by 7 other vulnerabilities. |
|
|
VCID-49ve-fmbg-dfax
Aliases: CVE-2016-7098 |
Affected by 7 other vulnerabilities. |
|
|
VCID-4sdq-v9u1-97fy
Aliases: CVE-2017-13089 |
Affected by 9 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 1 other vulnerability. |
|
|
VCID-6hyy-mdcx-wbdc
Aliases: CVE-2014-4877 |
Affected by 10 other vulnerabilities. Affected by 9 other vulnerabilities. |
|
|
VCID-dt45-jeut-aygn
Aliases: CVE-2017-6508 |
Affected by 1 other vulnerability. |
|
|
VCID-huu2-56sz-cygz
Aliases: CVE-2017-13090 |
Affected by 9 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 1 other vulnerability. |
|
|
VCID-hvaz-vpsw-fuex
Aliases: CVE-2010-2252 |
Affected by 11 other vulnerabilities. |
|
|
VCID-jgy2-zfn9-zufe
Aliases: CVE-2024-38428 |
url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent. |
Affected by 1 other vulnerability. |
|
VCID-m66j-6t39-fub6
Aliases: CVE-2006-6719 |
Wget attempts to dereference NULL pointer upon response from malicious FTP server |
Affected by 10 other vulnerabilities. |
|
VCID-pnzs-b3tw-hudy
Aliases: CVE-2009-3490 |
Affected by 11 other vulnerabilities. |
|
|
VCID-rk2k-3ke9-h3ev
Aliases: CVE-2018-0494 |
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line. |
Affected by 9 other vulnerabilities. Affected by 7 other vulnerabilities. Affected by 1 other vulnerability. |
|
VCID-tcup-t96u-s7gm
Aliases: CVE-2018-20483 |
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl. |
Affected by 1 other vulnerability. |
|
VCID-wa8k-k5qt-f3bv
Aliases: CVE-2019-5953 |
Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. |
Affected by 7 other vulnerabilities. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||