Awstats packages fixed command execution vulnerability due to missing input sanitising.
Reporter | Title | Published | Views | Family All 43 |
---|---|---|---|---|
OSV | awstats - missing input sanitising | 15 Feb 200500:00 | – | osv |
OpenVAS | Debian Security Advisory DSA 682-1 (awstats) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-682-1) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200501-36 (awstats) | 24 Sep 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200501-36 (awstats) | 24 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OpenVAS | AWStats 'configdir' Parameter Arbitrary Command Execution Vulnerability | 3 Nov 200500:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3 | all | awstats | 4.0-0.woody.2 | awstats_4.0-0.woody.2_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo