Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1000500

Опубликовано: 26 июн. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

1:1.27.2-2ubuntu3.3
cosmic

ignored

end of life
devel

released

1:1.30.1-4ubuntu9
disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

1:1.27.2-2ubuntu3.3
esm-infra/focal

not-affected

1:1.30.1-4ubuntu6.2
esm-infra/xenial

not-affected

code not present

Показывать по

EPSS

Процентиль: 64%
0.00485
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
nvd
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
msrc
больше 4 лет назад

Описание отсутствует

CVSS3: 8.1
debian
около 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in ...

CVSS3: 8.1
github
около 3 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

EPSS

Процентиль: 64%
0.00485
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3