Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0494

EPSS 64.16% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0494

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
GNU Wget 输入验证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GNU Wget是GNU计划开发的一套用于在网络上进行下载的自由软件,它支持通过HTTP、HTTPS以及FTP这三个最常见的TCP/IP协议下载。 GNU Wget 1.19.5之前版本中的http.c文件的‘resp_new’函数存在安全漏洞。攻击者可利用该漏洞注入任意的cookie条目。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-WGet WGet -

II. Public POCs for CVE-2018-0494

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0494

Please Login to view more intelligence information

Same Patch Batch · n/a · 2018-05-06 · 4 CVEs total

CVE-2018-10767libgxps 缓冲区错误漏洞
CVE-2018-10768Freedesktop Poppler 代码问题漏洞
CVE-2018-10686Vesta Control Panel 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2018-0494

No comments yet


Leave a comment