{"id":"CVE-2004-1487","details":"wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a \"..\" that resolves to the IP address of the malicious server, which bypasses wget's filtering for \"..\" sequences.","modified":"2026-04-10T03:36:38.237330Z","published":"2005-04-27T04:00:00Z","references":[{"type":"ADVISORY","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/11871"},{"type":"EVIDENCE","url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/11871"},{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=110269474112384&w=2"},{"type":"WEB","url":"http://securitytracker.com/id?1012472"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2005-771.html"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/18420"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682"},{"type":"WEB","url":"https://usn.ubuntu.com/145-1/"}],"schema_version":"1.7.5"}