Awstats has vulnerabilities due to missing input sanitizing, allowing arbitrary command execution.
Reporter | Title | Published | Views | Family All 43 |
---|---|---|---|---|
![]() | Debian: Security Advisory (DSA-682-1) | 17 Jan 200800:00 | – | openvas |
![]() | Debian Security Advisory DSA 682-1 (awstats) | 17 Jan 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-36 (awstats) | 24 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200501-36 (awstats) | 24 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
![]() | AWStats 'configdir' Parameter Arbitrary Command Execution Vulnerability | 3 Nov 200500:00 | – | openvas |
![]() | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
![]() | FreeBSD Ports: awstats | 4 Sep 200800:00 | – | openvas |
![]() | [SECURITY] [DSA 682-1] New awstats packages fix arbitrary command execution | 15 Feb 200507:24 | – | debian |
Source | Link |
---|---|
debian | www.debian.org/security/2005/dsa-682 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo