GNU wget versions prior to 1.1.8 arbitrary file upload and code execution exploit.
9eb9c61465681cef828940670f5a66c10bc60e1ed0055a7bd92271cfbcee572f
GNU Wget versions 1.7 through 1.19.4 suffer from a cookie injection vulnerability.
b72d6af0b5fe5fde5c7651980f119d80e8e2748eee305bde3f06e6b5d7c00dd2
GNU wget versions 1.17 and earlier, when used in mirroring/recursive mode, are affected by a race condition vulnerability that might allow remote attackers to bypass intended wget access list restrictions specified with the -A parameter. This might allow attackers to place malicious/restricted files onto the system. Depending on the application / download directory, this could potentially lead to other vulnerabilities such as code execution, etc.
c9c7cf1f94f2e1d07833e7d43576bff9a1066ace4df75ff0824c5188b1e5e8fe
GNU Wget versions prior to 1.18 suffer from an arbitrary file upload vulnerability that may allow for remote code execution.
3ebf4d81b9c108e57502040e8018d849ca791f68c50a3e363db8ee6554556d53
42 bytes small Linux/x86 execve("/usr/bin/wget","aaaa"); shellcode.
4f28ade719844d3175c926a102509862dcf892f296efb022e1caddea183500d6
WGet version 1.10.2 and below suffer from an unchecked boundary condition. Proof of concept included.
0b8cd699959612ccb566a5227b9e6bd38d4243e7bc9fe86ad24ee53ca26f80a3
Proof of concept exploit for the wget directory traversal vulnerability that affects versions 1.8 and below.
4f69b0514c0819b845039ad1a0f2bd0421f909a68ea1db660bb1e9897cb59032
wget versions 1.8 and below allow for arbitrary overwriting, creating, and appending to files on the underlying system with the permissions of the user executing the binary. The files to be written to can be anywhere regardless of what the end user has requested. The primary flaw is a failure to sanitize redirection data.
1be8cddd71aff948bf1e3a1902aa0ce2fa4a77c5d800966d1b956c4a162900a8
Exploit that makes use of the mod_userdir vulnerability in various Apache 1.3 and 2.x servers. Ported to Windows by John Bissell.
fd00f9773c4596c9142305598ecee7f1d725ed3b3692b9348414e4cd20e373f2
Wget versions 1.9 and 1.9.1 are susceptible to a symlink attack during a phase where it downloads the file to a temporary filename but does not actually lock the file.
3e19a9e65f1b07c2febfde7d6bffc9cc7a814a75db5421d998b8a9cb89dcc8c5