Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-1000500

Опубликовано: 26 июн. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

1:1.27.2-2ubuntu3.3
cosmic

ignored

end of life
devel

released

1:1.30.1-4ubuntu9
disco

ignored

end of life
eoan

ignored

end of life
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

released

1:1.27.2-2ubuntu3.3
esm-infra/focal

released

1:1.30.1-4ubuntu6.2
esm-infra/xenial

not-affected

code not present

Показывать по

EPSS

Процентиль: 68%
0.0059
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
nvd
больше 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVSS3: 8.1
msrc
около 5 лет назад

Описание отсутствует

CVSS3: 8.1
debian
больше 7 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in ...

CVSS3: 8.1
github
больше 3 лет назад

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

EPSS

Процентиль: 68%
0.0059
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3