wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a “…” that resolves to the IP address of the malicious server, which bypasses wget’s filtering for “…” sequences.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=261755
marc.info/?l=bugtraq&m=110269474112384&w=2
securitytracker.com/id?1012472
www.redhat.com/support/errata/RHSA-2005-771.html
www.securityfocus.com/bid/11871
exchange.xforce.ibmcloud.com/vulnerabilities/18420
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11682
usn.ubuntu.com/145-1/