wget is vulnerable to information disclosure. The vulnerability exists as the information exposure in set_file_metadata function in xattr.c.
CPE | Name | Operator | Version |
---|---|---|---|
curl | eq | 7.61.1__8.el8 | |
curl | eq | 7.61.1__8.el8 |
git.savannah.gnu.org/cgit/wget.git/tree/NEWS
git.savannah.gnu.org/cgit/wget.git/tree/NEWS
www.securityfocus.com/bid/106358
www.securityfocus.com/bid/106358
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/
access.redhat.com/errata/RHSA-2019:3701
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1669156
security.gentoo.org/glsa/201903-08
security.gentoo.org/glsa/201903-08
security.netapp.com/advisory/ntap-20190321-0002/
security.netapp.com/advisory/ntap-20190321-0002/
twitter.com/marcan42/status/1077676739877232640
twitter.com/marcan42/status/1077676739877232640
usn.ubuntu.com/3943-1/
usn.ubuntu.com/3943-1/