Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2088-1 | New wget packages fix potential code execution |
EUVD |
EUVD-2010-2264 | GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory. |
Ubuntu USN |
USN-982-1 | Wget vulnerability |
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T02:25:07.646Z
Reserved: 2010-06-09T00:00:00.000Z
Link: CVE-2010-2252
No data.
Status : Modified
Published: 2010-07-06T17:17:13.313
Modified: 2026-04-29T01:13:23.040
Link: CVE-2010-2252
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN