AWStats lacks input validation on pluginmode, allowing remote command execution risks.
Reporter | Title | Published | Views | Family All 20 |
---|---|---|---|---|
![]() | CVE-2005-0363 | 16 Feb 200505:00 | – | cvelist |
![]() | CVE-2005-0363 | 2 May 200504:00 | – | debiancve |
![]() | CVE-2005-0363 | 2 May 200500:00 | – | ubuntucve |
![]() | AWStats Plugin Multiple Remote Command Execution (CVE-2005-0363) | 16 Mar 201500:00 | – | checkpoint_advisories |
![]() | CVE-2005-0363 | 2 May 200504:00 | – | cve |
![]() | CVE-2005-0363 | 2 May 200504:00 | – | nvd |
![]() | [SECURITY] [DSA 682-1] New awstats packages fix arbitrary command execution | 15 Feb 200507:24 | – | debian |
![]() | [SECURITY] [DSA 682-1] New awstats packages fix arbitrary command execution | 15 Feb 200507:24 | – | debian |
![]() | awstats - missing input sanitising | 15 Feb 200500:00 | – | osv |
![]() | Debian: Security Advisory (DSA-682-1) | 17 Jan 200800:00 | – | openvas |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo