Remote arbitrary command execution in awstats
Reporter | Title | Published | Views | Family All 22 |
---|---|---|---|---|
OpenVAS | Debian Security Advisory DSA 892-1 (awstats) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200508-07 (awstats) | 24 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-892-1) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200508-07 (awstats) | 24 Sep 200800:00 | – | openvas |
OpenVAS | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-167-1) | 26 Aug 202200:00 | – | openvas |
Debian | [SECURITY] [DSA 892-1] New awstats packages fix arbitrary command execution | 10 Nov 200506:10 | – | debian |
NVD | CVE-2005-1527 | 15 Aug 200504:00 | – | nvd |
Tenable Nessus | GLSA-200508-07 : AWStats: Arbitrary code execution using malicious Referrer information | 18 Aug 200500:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3.1 | all | awstats | 6.4-1sarge1 | awstats_6.4-1sarge1_all.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo