Логотип exploitDog
bind:CVE-2025-69195
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-69195

Количество 4

Количество 4

ubuntu логотип

CVE-2025-69195

7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-69195

7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2025-69195

7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffe ...

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-q2gj-jpwc-8f46

7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
7 дней назад
nvd логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
7 дней назад
debian логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffe ...

CVSS3: 7.6
0%
Низкий
7 дней назад
github логотип
GHSA-q2gj-jpwc-8f46

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
7 дней назад

Уязвимостей на страницу