Логотип exploitDog
bind:"BDU:2015-09791" OR bind:"CVE-2014-4877"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2015-09791" OR bind:"CVE-2014-4877"

Количество 7

Количество 7

fstec логотип

BDU:2015-09791

почти 11 лет назад

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 9.3
EPSS: Средний
ubuntu логотип

CVE-2014-4877

почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 9.3
EPSS: Средний
redhat логотип

CVE-2014-4877

почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 4.3
EPSS: Средний
nvd логотип

CVE-2014-4877

почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 9.3
EPSS: Средний
debian логотип

CVE-2014-4877

почти 11 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when re ...

CVSS2: 9.3
EPSS: Средний
github логотип

GHSA-p2w7-gcfj-5p55

больше 3 лет назад

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

EPSS: Средний
oracle-oval логотип

ELSA-2014-1764

почти 11 лет назад

ELSA-2014-1764: wget security update (MODERATE)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2015-09791

Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

CVSS2: 9.3
69%
Средний
почти 11 лет назад
ubuntu логотип
CVE-2014-4877

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 9.3
69%
Средний
почти 11 лет назад
redhat логотип
CVE-2014-4877

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 4.3
69%
Средний
почти 11 лет назад
nvd логотип
CVE-2014-4877

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

CVSS2: 9.3
69%
Средний
почти 11 лет назад
debian логотип
CVE-2014-4877

Absolute path traversal vulnerability in GNU Wget before 1.16, when re ...

CVSS2: 9.3
69%
Средний
почти 11 лет назад
github логотип
GHSA-p2w7-gcfj-5p55

Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.

69%
Средний
больше 3 лет назад
oracle-oval логотип
ELSA-2014-1764

ELSA-2014-1764: wget security update (MODERATE)

почти 11 лет назад

Уязвимостей на страницу