Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2006-6719 (GCVE-0-2006-6719)
Vulnerability from cvelistv5 – Published: 2006-12-23 11:00 – Updated: 2024-08-07 20:33
VLAI?
EPSS
Summary
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
4 references
| URL | Tags |
|---|---|
| https://issues.rpath.com/browse/RPL-930 | x_refsource_CONFIRM |
| http://www.securityfocus.com/bid/21650 | vdb-entryx_refsource_BID |
| https://www.exploit-db.com/exploits/2947 | exploitx_refsource_EXPLOIT-DB |
| http://www.mandriva.com/security/advisories?name=… | vendor-advisoryx_refsource_MANDRIVA |
Date Public ?
2006-12-18 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T20:33:59.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"name": "21650",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/21650"
},
{
"name": "2947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"name": "MDKSA-2007:017",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2006-12-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-18T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"name": "21650",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/21650"
},
{
"name": "2947",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"name": "MDKSA-2007:017",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6719",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://issues.rpath.com/browse/RPL-930",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"name": "21650",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21650"
},
{
"name": "2947",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"name": "MDKSA-2007:017",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2006-6719",
"datePublished": "2006-12-23T11:00:00.000Z",
"dateReserved": "2006-12-22T00:00:00.000Z",
"dateUpdated": "2024-08-07T20:33:59.979Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2006-6719",
"date": "2026-05-19",
"epss": "0.04476",
"percentile": "0.8921"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50DD71F2-0B3C-4082-950A-CBFA5C601AEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26B3B1B6-3985-4479-93B2-14E1AB52F768\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BC975AA-0F98-4A3A-B3B4-2152156327D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7DEDFB88-C435-4FB9-838D-8199690A8F70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5BF2616-A99A-4229-A8A6-655155ED5EB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A14454E-DDAE-4115-8323-8BB4E17DF208\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94E758F9-798B-4C25-A94A-8BF4E3E90B3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F88CD81A-7804-4316-8581-41689A318D56\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BE0FCE2-ABB9-4943-96AE-C81277014396\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FDE8FE2E-40EF-4B86-A01E-7777FBDABB59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E097843-1854-4C5E-BB27-07280EB3EEB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1047974D-7A5D-4533-996B-2B09EC7E8789\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n ftp_syst en ftp-basic.c en Free Software Foundation (FSF) GNU wget 1.10.2 permite a un atacante remoto provocar denegaci\\u00f3n de servicio (caida de aplicaci\\u00f3n) a trav\\u00e9s de un servidor FTP malicioso con un gran n\\u00famero de respuestas 220 en blanco al comando SYST.\"}]",
"id": "CVE-2006-6719",
"lastModified": "2024-11-21T00:23:29.047",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2006-12-23T11:28:00.000",
"references": "[{\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/21650\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-930\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://www.exploit-db.com/exploits/2947\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/21650\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"https://issues.rpath.com/browse/RPL-930\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.exploit-db.com/exploits/2947\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vendorComments": "[{\"organization\": \"Red Hat\", \"comment\": \"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=221459\\n\\nWe do not consider a crash of a client application such as wget to be a security issue.\\n\\nThis flaw was fixed in wget shipped in Red Hat Enterprise Linux 5 before the initial release of the product. Version of wget shipped in Red Hat Enterprise Linux 3 and 4 are affected by this bug.\", \"lastModified\": \"2009-10-07T00:00:00\"}]",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2006-6719\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2006-12-23T11:28:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n ftp_syst en ftp-basic.c en Free Software Foundation (FSF) GNU wget 1.10.2 permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) a trav\u00e9s de un servidor FTP malicioso con un gran n\u00famero de respuestas 220 en blanco al comando SYST.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DD71F2-0B3C-4082-950A-CBFA5C601AEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26B3B1B6-3985-4479-93B2-14E1AB52F768\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BC975AA-0F98-4A3A-B3B4-2152156327D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEDFB88-C435-4FB9-838D-8199690A8F70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BF2616-A99A-4229-A8A6-655155ED5EB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A14454E-DDAE-4115-8323-8BB4E17DF208\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E758F9-798B-4C25-A94A-8BF4E3E90B3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88CD81A-7804-4316-8581-41689A318D56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BE0FCE2-ABB9-4943-96AE-C81277014396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDE8FE2E-40EF-4B86-A01E-7777FBDABB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E097843-1854-4C5E-BB27-07280EB3EEB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1047974D-7A5D-4533-996B-2B09EC7E8789\"}]}]}],\"references\":[{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/21650\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-930\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://www.exploit-db.com/exploits/2947\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:017\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/21650\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://issues.rpath.com/browse/RPL-930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/2947\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"Red Hat is aware of this issue and is tracking it via the following bug:\\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=221459\\n\\nWe do not consider a crash of a client application such as wget to be a security issue.\\n\\nThis flaw was fixed in wget shipped in Red Hat Enterprise Linux 5 before the initial release of the product. Version of wget shipped in Red Hat Enterprise Linux 3 and 4 are affected by this bug.\",\"lastModified\":\"2009-10-07T00:00:00\"}]}}"
}
}
FKIE_CVE-2006-6719
Vulnerability from fkie_nvd - Published: 2006-12-23 11:28 - Updated: 2026-04-23 00:35
Severity ?
Summary
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "50DD71F2-0B3C-4082-950A-CBFA5C601AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "26B3B1B6-3985-4479-93B2-14E1AB52F768",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC975AA-0F98-4A3A-B3B4-2152156327D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7DEDFB88-C435-4FB9-838D-8199690A8F70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D5BF2616-A99A-4229-A8A6-655155ED5EB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3A14454E-DDAE-4115-8323-8BB4E17DF208",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94E758F9-798B-4C25-A94A-8BF4E3E90B3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F88CD81A-7804-4316-8581-41689A318D56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1BE0FCE2-ABB9-4943-96AE-C81277014396",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE8FE2E-40EF-4B86-A01E-7777FBDABB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E097843-1854-4C5E-BB27-07280EB3EEB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1047974D-7A5D-4533-996B-2B09EC7E8789",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command."
},
{
"lang": "es",
"value": "La funci\u00f3n ftp_syst en ftp-basic.c en Free Software Foundation (FSF) GNU wget 1.10.2 permite a un atacante remoto provocar denegaci\u00f3n de servicio (caida de aplicaci\u00f3n) a trav\u00e9s de un servidor FTP malicioso con un gran n\u00famero de respuestas 220 en blanco al comando SYST."
}
],
"id": "CVE-2006-6719",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2006-12-23T11:28:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/21650"
},
{
"source": "cve@mitre.org",
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"source": "cve@mitre.org",
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/21650"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.exploit-db.com/exploits/2947"
}
],
"sourceIdentifier": "cve@mitre.org",
"vendorComments": [
{
"comment": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=221459\n\nWe do not consider a crash of a client application such as wget to be a security issue.\n\nThis flaw was fixed in wget shipped in Red Hat Enterprise Linux 5 before the initial release of the product. Version of wget shipped in Red Hat Enterprise Linux 3 and 4 are affected by this bug.",
"lastModified": "2009-10-07T00:00:00",
"organization": "Red Hat"
}
],
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-XP2F-5GQQ-P6J5
Vulnerability from github – Published: 2022-05-01 07:40 – Updated: 2022-05-01 07:40
VLAI?
Details
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
{
"affected": [],
"aliases": [
"CVE-2006-6719"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2006-12-23T11:28:00Z",
"severity": "MODERATE"
},
"details": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.",
"id": "GHSA-xp2f-5gqq-p6j5",
"modified": "2022-05-01T07:40:44Z",
"published": "2022-05-01T07:40:44Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-6719"
},
{
"type": "WEB",
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/21650"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2006-6719
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2006-6719",
"description": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.",
"id": "GSD-2006-6719",
"references": [
"https://www.suse.com/security/cve/CVE-2006-6719.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2006-6719"
],
"details": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.",
"id": "GSD-2006-6719",
"modified": "2023-12-13T01:19:54.582480Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6719",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://issues.rpath.com/browse/RPL-930",
"refsource": "CONFIRM",
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"name": "21650",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/21650"
},
{
"name": "2947",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/2947"
},
{
"name": "MDKSA-2007:017",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.10.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.10.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.9.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:wget:1.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2006-6719"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "21650",
"refsource": "BID",
"tags": [
"Exploit"
],
"url": "http://www.securityfocus.com/bid/21650"
},
{
"name": "https://issues.rpath.com/browse/RPL-930",
"refsource": "CONFIRM",
"tags": [],
"url": "https://issues.rpath.com/browse/RPL-930"
},
{
"name": "MDKSA-2007:017",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:017"
},
{
"name": "2947",
"refsource": "EXPLOIT-DB",
"tags": [],
"url": "https://www.exploit-db.com/exploits/2947"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2017-10-19T01:29Z",
"publishedDate": "2006-12-23T11:28Z"
}
}
}
OPENSUSE-SU-2024:11510-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
wget-1.21.1-2.2 on GA media
Severity
Moderate
Notes
Title of the patch: wget-1.21.1-2.2 on GA media
Description of the patch: These are all security issues fixed in the wget-1.21.1-2.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11510
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
8.8 (High)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
6.1 (Medium)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
5.4 (Medium)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
6.2 (Medium)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
moderate
8.8 (High)
Affected products
Recommended
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64 | — |
Vendor Fix
|
Threats
Impact
important
References
26 references
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "wget-1.21.1-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the wget-1.21.1-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11510",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11510-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2006-6719 page",
"url": "https://www.suse.com/security/cve/CVE-2006-6719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13089 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13089/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13090 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13090/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6508 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6508/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0494 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0494/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-20483 page",
"url": "https://www.suse.com/security/cve/CVE-2018-20483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-5953 page",
"url": "https://www.suse.com/security/cve/CVE-2019-5953/"
}
],
"title": "wget-1.21.1-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11510-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "wget-1.21.1-2.2.aarch64",
"product": {
"name": "wget-1.21.1-2.2.aarch64",
"product_id": "wget-1.21.1-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "wget-lang-1.21.1-2.2.aarch64",
"product": {
"name": "wget-lang-1.21.1-2.2.aarch64",
"product_id": "wget-lang-1.21.1-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "wget-1.21.1-2.2.ppc64le",
"product": {
"name": "wget-1.21.1-2.2.ppc64le",
"product_id": "wget-1.21.1-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "wget-lang-1.21.1-2.2.ppc64le",
"product": {
"name": "wget-lang-1.21.1-2.2.ppc64le",
"product_id": "wget-lang-1.21.1-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "wget-1.21.1-2.2.s390x",
"product": {
"name": "wget-1.21.1-2.2.s390x",
"product_id": "wget-1.21.1-2.2.s390x"
}
},
{
"category": "product_version",
"name": "wget-lang-1.21.1-2.2.s390x",
"product": {
"name": "wget-lang-1.21.1-2.2.s390x",
"product_id": "wget-lang-1.21.1-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "wget-1.21.1-2.2.x86_64",
"product": {
"name": "wget-1.21.1-2.2.x86_64",
"product_id": "wget-1.21.1-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "wget-lang-1.21.1-2.2.x86_64",
"product": {
"name": "wget-lang-1.21.1-2.2.x86_64",
"product_id": "wget-lang-1.21.1-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-1.21.1-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64"
},
"product_reference": "wget-1.21.1-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-1.21.1-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le"
},
"product_reference": "wget-1.21.1-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-1.21.1-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.s390x"
},
"product_reference": "wget-1.21.1-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-1.21.1-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64"
},
"product_reference": "wget-1.21.1-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-lang-1.21.1-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64"
},
"product_reference": "wget-lang-1.21.1-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-lang-1.21.1-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le"
},
"product_reference": "wget-lang-1.21.1-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-lang-1.21.1-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x"
},
"product_reference": "wget-lang-1.21.1-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wget-lang-1.21.1-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
},
"product_reference": "wget-lang-1.21.1-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-6719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2006-6719"
}
],
"notes": [
{
"category": "general",
"text": "The ftp_syst function in ftp-basic.c in Free Software Foundation (FSF) GNU wget 1.10.2 allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2006-6719",
"url": "https://www.suse.com/security/cve/CVE-2006-6719"
},
{
"category": "external",
"summary": "SUSE Bug 231063 for CVE-2006-6719",
"url": "https://bugzilla.suse.com/231063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2006-6719"
},
{
"cve": "CVE-2017-13089",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13089"
}
],
"notes": [
{
"category": "general",
"text": "The http.c:skip_short_body() function is called in some circumstances, such as when processing redirects. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk\u0027s length, but doesn\u0027t check that the chunk length is a non-negative number. The code then tries to skip the chunk in pieces of 512 bytes by using the MIN() macro, but ends up passing the negative chunk length to connect.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13089",
"url": "https://www.suse.com/security/cve/CVE-2017-13089"
},
{
"category": "external",
"summary": "SUSE Bug 1064715 for CVE-2017-13089",
"url": "https://bugzilla.suse.com/1064715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13089"
},
{
"cve": "CVE-2017-13090",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13090"
}
],
"notes": [
{
"category": "general",
"text": "The retr.c:fd_read_body() function is called when processing OK responses. When the response is sent chunked in wget before 1.19.2, the chunk parser uses strtol() to read each chunk\u0027s length, but doesn\u0027t check that the chunk length is a non-negative number. The code then tries to read the chunk in pieces of 8192 bytes by using the MIN() macro, but ends up passing the negative chunk length to retr.c:fd_read(). As fd_read() takes an int argument, the high 32 bits of the chunk length are discarded, leaving fd_read() with a completely attacker controlled length argument. The attacker can corrupt malloc metadata after the allocated buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13090",
"url": "https://www.suse.com/security/cve/CVE-2017-13090"
},
{
"category": "external",
"summary": "SUSE Bug 1064716 for CVE-2017-13090",
"url": "https://bugzilla.suse.com/1064716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-13090"
},
{
"cve": "CVE-2017-6508",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6508"
}
],
"notes": [
{
"category": "general",
"text": "CRLF injection vulnerability in the url_parse function in url.c in Wget through 1.19.1 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in the host subcomponent of a URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6508",
"url": "https://www.suse.com/security/cve/CVE-2017-6508"
},
{
"category": "external",
"summary": "SUSE Bug 1028301 for CVE-2017-6508",
"url": "https://bugzilla.suse.com/1028301"
},
{
"category": "external",
"summary": "SUSE Bug 1159418 for CVE-2017-6508",
"url": "https://bugzilla.suse.com/1159418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-6508"
},
{
"cve": "CVE-2018-0494",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0494"
}
],
"notes": [
{
"category": "general",
"text": "GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \\r\\n sequence in a continuation line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0494",
"url": "https://www.suse.com/security/cve/CVE-2018-0494"
},
{
"category": "external",
"summary": "SUSE Bug 1092061 for CVE-2018-0494",
"url": "https://bugzilla.suse.com/1092061"
},
{
"category": "external",
"summary": "SUSE Bug 1123797 for CVE-2018-0494",
"url": "https://bugzilla.suse.com/1123797"
},
{
"category": "external",
"summary": "SUSE Bug 1159418 for CVE-2018-0494",
"url": "https://bugzilla.suse.com/1159418"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-0494"
},
{
"cve": "CVE-2018-20483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-20483"
}
],
"notes": [
{
"category": "general",
"text": "set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file\u0027s origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-20483",
"url": "https://www.suse.com/security/cve/CVE-2018-20483"
},
{
"category": "external",
"summary": "SUSE Bug 1120382 for CVE-2018-20483",
"url": "https://bugzilla.suse.com/1120382"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-20483"
},
{
"cve": "CVE-2019-5953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-5953"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-5953",
"url": "https://www.suse.com/security/cve/CVE-2019-5953"
},
{
"category": "external",
"summary": "SUSE Bug 1131493 for CVE-2019-5953",
"url": "https://bugzilla.suse.com/1131493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:wget-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-1.21.1-2.2.x86_64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.aarch64",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.ppc64le",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.s390x",
"openSUSE Tumbleweed:wget-lang-1.21.1-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-5953"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…