Логотип exploitDog
bind:"CVE-2019-3822" OR bind:"CVE-2019-3823" OR bind:"CVE-2018-20483" OR bind:"CVE-2018-16890"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-3822" OR bind:"CVE-2019-3823" OR bind:"CVE-2018-20483" OR bind:"CVE-2018-16890"

Количество 36

Количество 36

fstec логотип

BDU:2019-00966

больше 6 лет назад

Уязвимость библиотеки libcurl, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 9.8
EPSS: Низкий
ubuntu логотип

CVE-2018-20483

больше 6 лет назад

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2018-20483

больше 6 лет назад

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2018-20483

больше 6 лет назад

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2018-20483

больше 6 лет назад

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's ...

CVSS3: 7.8
EPSS: Низкий
ubuntu логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 4.3
EPSS: Низкий
nvd логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2018-16890

больше 6 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2019:0057-1

около 6 лет назад

Security update for wget

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:0093-1

больше 6 лет назад

Security update for wget

EPSS: Низкий
github логотип

GHSA-mxm6-6r3r-6wj4

около 3 лет назад

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2020-04857

больше 6 лет назад

Уязвимость функции set_file_metadata менеджера загрузок GNU Wget, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-53fg-3j53-939q

около 3 лет назад

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-01750

больше 6 лет назад

Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2019-00964

больше 6 лет назад

Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2019-00966

Уязвимость библиотеки libcurl, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 9.8
1%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-20483

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-20483

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 5.5
0%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-20483

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-20483

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's ...

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
ubuntu логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
redhat логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 4.3
1%
Низкий
больше 6 лет назад
nvd логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
debian логотип
CVE-2018-16890

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap ...

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
suse-cvrf логотип
openSUSE-SU-2019:0057-1

Security update for wget

0%
Низкий
около 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:0093-1

Security update for wget

0%
Низкий
больше 6 лет назад
github логотип
GHSA-mxm6-6r3r-6wj4

set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.

CVSS3: 7.8
0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-04857

Уязвимость функции set_file_metadata менеджера загрузок GNU Wget, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 7.8
0%
Низкий
больше 6 лет назад
github логотип
GHSA-53fg-3j53-939q

libcurl versions from 7.36.0 to before 7.64.0 is vulnerable to a heap buffer out-of-bounds read. The function handling incoming NTLM type-2 messages (`lib/vauth/ntlm.c:ntlm_decode_type2_target`) does not validate incoming data correctly and is subject to an integer overflow vulnerability. Using that overflow, a malicious or broken NTLM server could trick libcurl to accept a bad length + offset combination that would lead to a buffer read out-of-bounds.

CVSS3: 7.5
1%
Низкий
около 3 лет назад
fstec логотип
BDU:2019-01750

Уязвимость функции ntlm_decode_type2_target библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 6 лет назад
fstec логотип
BDU:2019-00964

Уязвимость функции NTLM type-2 библиотеки libcurl, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
1%
Низкий
больше 6 лет назад

Уязвимостей на страницу