Логотип exploitDog
bind:"CVE-2025-69195"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-69195"

Количество 7

Количество 7

ubuntu логотип

CVE-2025-69195

3 месяца назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
redhat логотип

CVE-2025-69195

3 месяца назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
nvd логотип

CVE-2025-69195

3 месяца назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
msrc логотип

CVE-2025-69195

3 месяца назад

Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls

CVSS3: 7.6
EPSS: Низкий
debian логотип

CVE-2025-69195

3 месяца назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffe ...

CVSS3: 7.6
EPSS: Низкий
github логотип

GHSA-q2gj-jpwc-8f46

3 месяца назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2026:20038-1

2 месяца назад

Security update for wget2

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-69195

Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls

CVSS3: 7.6
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-69195

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffe ...

CVSS3: 7.6
0%
Низкий
3 месяца назад
github логотип
GHSA-q2gj-jpwc-8f46

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
0%
Низкий
3 месяца назад
suse-cvrf логотип
openSUSE-SU-2026:20038-1

Security update for wget2

2 месяца назад

Уязвимостей на страницу