Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1760-1 | wget security update |
![]() |
DSA-4425-1 | wget security update |
![]() |
EUVD-2019-15521 | Buffer overflow in GNU Wget 1.20.1 and earlier allows remote attackers to cause a denial-of-service (DoS) or may execute an arbitrary code via unspecified vectors. |
![]() |
USN-3943-1 | Wget vulnerabilities |
![]() |
USN-3943-2 | Wget vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-04T20:09:23.991Z
Reserved: 2019-01-10T00:00:00
Link: CVE-2019-5953

No data.

Status : Modified
Published: 2019-05-17T16:29:05.360
Modified: 2024-11-21T04:45:47.903
Link: CVE-2019-5953


No data.