Описание
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-1565
- https://exchange.xforce.ibmcloud.com/vulnerabilities/10851
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000716
- http://marc.info/?l=bugtraq&m=105474357016184&w=2
- http://www.debian.org/security/2002/dsa-209
- http://www.redhat.com/support/errata/RHSA-2003-372.html
EPSS
CVE ID
Связанные уязвимости
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Buffer overflow in url_filename function for wget 1.8.1 allows attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a long URL.
Buffer overflow in url_filename function for wget 1.8.1 allows attacke ...
EPSS